-
1
-
-
85180532687
-
Generic application-level protocol analyzer and its language
-
Borisov, N., Brumley, D., Wang, H., Dunagan, J., Joshi, P., Guo, C: Generic application-level protocol analyzer and its language. In: Proc. of Network and Distributed System Security Symposium (NDSS) (2007)
-
(2007)
Proc. of Network and Distributed System Security Symposium (NDSS)
-
-
Borisov, N.1
Brumley, D.2
Wang, H.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
2
-
-
58449100838
-
-
Cretu, G., Stavrou, A., Locasto, M., Stolfo, S., Keromytis, A.: Casting out demons: Sanitizing training data for anomaly sensors. In: ieeesp (to appear, 2008)
-
Cretu, G., Stavrou, A., Locasto, M., Stolfo, S., Keromytis, A.: Casting out demons: Sanitizing training data for anomaly sensors. In: ieeesp (to appear, 2008)
-
-
-
-
3
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, USA, pp
-
Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: Proc. of IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 120-128 (1996)
-
(1996)
Proc. of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
4
-
-
33750379862
-
-
Gao, D., Reiter, M., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNGS, 4219, pp. 19-40. Springer, Heidelberg (2006)
-
Gao, D., Reiter, M., Song, D.: Behavioral distance measurement using hidden markov models. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNGS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
38149142569
-
-
Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for http. In: Kruegel, C, Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 42-62. Springer, Heidelberg (2007)
-
Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for http. In: Kruegel, C, Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 42-62. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
33846369107
-
Learning dfa representations of http for protecting web applications
-
Ingham, K.L., Somayaji, A. Burge, J., Forrest. S.: Learning dfa representations of http for protecting web applications. Computer Networks 51(5), 1239-1255 (2007)
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
7
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Kruegel, C, Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proc. of ACM Symposium on Applied Computing, pp. 201-208 (2002)
-
(2002)
Proc. of ACM Symposium on Applied Computing
, pp. 201-208
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
9
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S.: A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information Systems Security 3, 227-261 (2000)
-
(2000)
ACM Transactions on Information Systems Security
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
10
-
-
0036358995
-
The spectrum kernel: A string kernel for SVM protein classification
-
Leslie, C, Eskin, E., Noble, W.: The spectrum kernel: A string kernel for SVM protein classification. In: Proc. Pacific Symp. Biocomputing, pp. 564-575 (2002)
-
(2002)
Proc. Pacific Symp. Biocomputing
, pp. 564-575
-
-
Leslie, C.1
Eskin, E.2
Noble, W.3
-
11
-
-
0141441130
-
PHAD: Packet header anomaly detection for identifying hostile network traffic
-
Technical Report CS-2001-2, Florida Institute of Technol- ogy
-
Mahoney, M., Chan, P.: PHAD: Packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technol- ogy (2001)
-
(2001)
-
-
Mahoney, M.1
Chan, P.2
-
13
-
-
0035272287
-
-
Müller, K.-R., Mika, S., R.atsch, G., Tsuda, K., Scholkopf, B.: An introduction to kernel-based learning algorithms. IEEE Neural Networks 12(2), 181-201 (2001)
-
Müller, K.-R., Mika, S., R.atsch, G., Tsuda, K., Scholkopf, B.: An introduction to kernel-based learning algorithms. IEEE Neural Networks 12(2), 181-201 (2001)
-
-
-
-
14
-
-
34547396634
-
L.: Binpae: a, yacc for writing application protocol parsers
-
Pang, R, Paxson, V., Sommer, R., Peterson, L.: binpae: a, yacc for writing application protocol parsers. In: Proc. of ACM Internet Measurement Conference, pp. 289-300 (2006)
-
(2006)
Proc. of ACM Internet Measurement Conference
, pp. 289-300
-
-
Pang, R.1
Paxson, V.2
Sommer, R.3
Peterson4
-
15
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. In: Proc. of USEN1X Security Symposium, pp. 31-51 (1998)
-
(1998)
Proc. of USEN1X Security Symposium
, pp. 31-51
-
-
Paxson, V.1
-
16
-
-
33746430492
-
-
Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Büchkes, R., Laskov, P. (eds.) D1MVA 2006. LNCS, 4064, pp. 74-90. Springer, Heidelberg (2006)
-
Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Büchkes, R., Laskov, P. (eds.) D1MVA 2006. LNCS, vol. 4064, pp. 74-90. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
Rieck, K., Laskov, P.: Language models for detection of unknown attacks in network traffic. Journal in Computer Virology 2(4), 243-256 (2007)
-
(2007)
Journal in Computer Virology
, vol.2
, Issue.4
, pp. 243-256
-
-
Rieck, K.1
Laskov, P.2
-
18
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
Rieck, K., Laskov, P.: Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research 9, 23-48 (2008)
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
21
-
-
0001986205
-
Data domain description by support vectors
-
ed, Proc. ESANN, Brussels, pp, D. Facto Press
-
Tax, D., Duin, R,.: Data domain description by support vectors. In: Verleysen, M. (ed.) Proc. ESANN, Brussels, pp. 251-256. D. Facto Press (1999)
-
(1999)
Verleysen, M
, pp. 251-256
-
-
Tax, D.1
Duin, R.2
-
22
-
-
33750335757
-
-
Wang, K., Parekh, J., Stolfo, S.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 226-248. Springer, Heidelberg (2006)
-
Wang, K., Parekh, J., Stolfo, S.: Anagram: A content anomaly detector resistant to mimicry attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
35048885009
-
-
Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 203-222. Springer, Heidelberg (2004)
-
Wang, K., Stolfo, S.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
-
-
|