-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S., The base-rate fallacy and the difficulty of intrusion detection ACM Transactions on Information and System Security 2000 3 3 186 201
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-201
-
-
Axelsson, S.1
-
4
-
-
0027593257
-
NADIR: An automated system for detecting network intrusion and misuse
-
Hochberg J., Jackson K., Stallings C., McClary J. F., DuBois D., Ford J., NADIR: an automated system for detecting network intrusion and misuse Computers Security 1993 12 3 235 248
-
(1993)
Computers Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
McClary, J.F.4
Dubois, D.5
Ford, J.6
-
5
-
-
0343302295
-
-
SRI PROJECT 4185-010 October Menlo Park, Calif, USA SRI International, Computer Science Laboratory
-
Lunt T., Jagannathan R., Lee R., IDES: the enhanced prototype, a real-time intrusion detection system 1988 October SRI Project 4185-010 Menlo Park, Calif, USA SRI International, Computer Science Laboratory
-
(1988)
IDES: The enhanced prototype, a real-time intrusion detection system
-
-
Lunt, T.1
Jagannathan, R.2
Lee, R.3
-
6
-
-
0024122965
-
-
Proceedings of the 4th IEEE Aerospace Computer Security Applications Conference December 1988 Orlando, Fla, USA
-
Smaha S. E., Haystack: an intrusion detection system Proceedings of the 4th IEEE Aerospace Computer Security Applications Conference December 1988 Orlando, Fla, USA 37 44
-
Haystack: An intrusion detection system
, pp. 37-44
-
-
Smaha, S.E.1
-
8
-
-
0029716418
-
-
Proceedings of IEEE Symposium on Security and Privacy May 1996 Oakland, Calif, USA
-
Forrest S., Hofmeyr S. A., Somayaji A., Longstaff T. A., A sense of self for unix processes Proceedings of IEEE Symposium on Security and Privacy May 1996 Oakland, Calif, USA 120 128
-
A sense of self for unix processes
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
9
-
-
33845989821
-
-
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06) March 2006 Taipei, Taiwan
-
Barreno M., Nelson B., Sears R., Joseph A. D., Tygar J. D., Can machine learning be secure? Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06) March 2006 Taipei, Taiwan 16 25
-
Can machine learning be secure?
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
10
-
-
49649112245
-
Analysis of a computer security dataset: Why machine learning algorithms fail on KDD dataset for misuse detection
-
Sabhnani M., Serpen G., Analysis of a computer security dataset: why machine learning algorithms fail on KDD dataset for misuse detection Intelligent Data Analysis 2004 8 4 403 415
-
(2004)
Intelligent Data Analysis
, vol.8
, Issue.4
, pp. 403-415
-
-
Sabhnani, M.1
Serpen, G.2
-
11
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha A., Park J.-M., An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 2007 51 12 3448 3470
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
12
-
-
0036343692
-
-
Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 02) June 2002 New York, NY, USA
-
Wang H., Zhang D., Shin K. G., Detecting SYN flooding attacks 3 Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 02) June 2002 New York, NY, USA 1530 1539
-
Detecting SYN flooding attacks
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
13
-
-
0141427794
-
-
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW 02) November 2002 Marseille, France
-
Barford P., Kline J., Plonka D., Ron A., A signal analysis of network traffic anomalies Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW 02) November 2002 Marseille, France 71 82
-
A signal analysis of network traffic anomalies
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
14
-
-
59949092517
-
-
Proceedings of the Asia-Pacific Conference on Communications (APCC 06) August 2006 Busan, Korea
-
Gao J., Hu G., Yao X., Chang R. K. C., Anomaly detection of network traffic based on wavelet packet Proceedings of the Asia-Pacific Conference on Communications (APCC 06) August 2006 Busan, Korea 1 5
-
Anomaly detection of network traffic based on wavelet packet
, pp. 1-5
-
-
Gao, J.1
Hu, G.2
Yao, X.3
Chang, R.K.C.4
-
15
-
-
59949087663
-
-
Proceedings of Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks August 2006 Baltimore, Md, USA
-
Huang C.-T., Thareja S., Shin Y.-J., Wavelet-based real time detection of network traffic anomalies Proceedings of Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks August 2006 Baltimore, Md, USA 1 7
-
Wavelet-based real time detection of network traffic anomalies
, pp. 1-7
-
-
Huang, C.-T.1
Thareja, S.2
Shin, Y.-J.3
-
16
-
-
33749819450
-
Image-based anomaly detection technique: Algorithm, implementation and effectiveness
-
Kim S. S., Reddy A. L. N., Image-based anomaly detection technique: algorithm, implementation and effectiveness IEEE Journal on Selected Areas in Communications 2006 24 10 1942 1954
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1942-1954
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
19
-
-
84952326439
-
-
Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03) October 2003 Dallas, Tex, USA
-
Li L., Lee G., DDoS attack detection and wavelets Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03) October 2003 Dallas, Tex, USA 421 427
-
DDoS attack detection and wavelets
, pp. 421-427
-
-
Li, L.1
Lee, G.2
-
20
-
-
50949130514
-
-
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 06) November 2006 San Francisco, Calif, USA
-
Dainotti A., Pescape A., Ventre G., Wavelet-based detection of DoS attacks Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 06) November 2006 San Francisco, Calif, USA 1 6
-
Wavelet-based detection of DoS attacks
, pp. 1-6
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
21
-
-
0003254064
-
-
Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurment (IMW 01) November 2001 San Francisco, Calif, USA
-
Huang P., Feldmann A., Willinger W., A non-intrusive, wavelet-based approach to detecting network performance problems Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurment (IMW 01) November 2001 San Francisco, Calif, USA 213 227
-
A non-intrusive, wavelet-based approach to detecting network performance problems
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
22
-
-
21844451952
-
-
Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04) September 2004 Portland, Ore, USA
-
Lakhina A., Crovella M., Diot C., Diagnosing network-wide traffic anomalies Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04) September 2004 Portland, Ore, USA 219 230
-
Diagnosing network-wide traffic anomalies
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
24
-
-
21844443617
-
A wavelet-based approach to detect shared congestion
-
Kim M. S., Kim T., Shin Y. J., Lam S. S., Powers E. J., A wavelet-based approach to detect shared congestion ACM SIGCOMM Computer Communication Review 2004 34 4 293 306
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.4
, pp. 293-306
-
-
Kim, M.S.1
Kim, T.2
Shin, Y.J.3
Lam, S.S.4
Powers, E.J.5
-
25
-
-
45149104919
-
-
Proceedings of International Conference on Wavelet Analysis and Pattern Recognition November 2007 Beijing, China
-
Liu B. S., Li Y. J., Hou Y. P., Sui X. S., The identification and correction of outlier based on wavelet transform of traffic flow Proceedings of International Conference on Wavelet Analysis and Pattern Recognition November 2007 Beijing, China 1498 1503
-
The identification and correction of outlier based on wavelet transform of traffic flow
, pp. 1498-1503
-
-
Liu, B.S.1
Li, Y.J.2
Hou, Y.P.3
Sui, X.S.4
-
26
-
-
34548613852
-
-
Proceedings of the 7th International Conference on Information Technology (CIT 04) December 2004 Hyderabad, India Lecture Notes in Computer Science
-
Rawat S., Sastry C. S., Network intrusion detection using wavelet analysis 3356 Proceedings of the 7th International Conference on Information Technology (CIT 04) December 2004 Hyderabad, India 224 232 Lecture Notes in Computer Science
-
Network intrusion detection using wavelet analysis
, vol.3356
, pp. 224-232
-
-
Rawat, S.1
Sastry, C.S.2
-
27
-
-
0000293183
-
Theory of communication
-
Gabor D., Theory of communication Journal of IEE 1946 93 429 441
-
(1946)
Journal of IEE
, vol.93
, pp. 429-441
-
-
Gabor, D.1
-
28
-
-
59949097314
-
-
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
KDDCUP,. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
-
-
Kddcup1
-
29
-
-
59949101916
-
-
1999, http://www.ll.mit.edu/IST/ideval/data/1999/1999dataindex.html
-
DARPA,. 1999, http://www.ll.mit.edu/IST/ideval/data/1999/1999dataindex. html
-
-
-
Darpa1
-
30
-
-
59949092401
-
-
1998, http://www.ll.mit.edu/IST/ideval/data/1998/1998dataindex.html
-
DARPA,. 1998, http://www.ll.mit.edu/IST/ideval/data/1998/1998dataindex. html
-
-
-
Darpa1
-
31
-
-
0001817134
-
Orthonormal wavelets
-
Berlin, Germany Springer
-
Meyer Y., Combes J. M., Grossman A., Tchamitchian P., Orthonormal wavelets Wavelets: Time-Frequency Methods and Phase Space 1989 Berlin, Germany Springer 21 37
-
(1989)
Wavelets: Time-Frequency Methods and Phase Space
, pp. 21-37
-
-
Meyer, Y.1
Combes, J.M.2
Grossman, A.3
Tchamitchian, P.4
-
36
-
-
0003747605
-
-
New York, NY, USA John Wiley Sons
-
Titterington D., Smith A., Makov U., Statistical Analysis of Finite Mixture Distributions 1985 New York, NY, USA John Wiley Sons
-
(1985)
Statistical Analysis of Finite Mixture Distributions
-
-
Titterington, D.1
Smith, A.2
Makov, U.3
-
38
-
-
59949085318
-
-
http://www.ethereal.com/docs/man-pages/editcap.1.html
-
Editcap,. http://www.ethereal.com/docs/man-pages/editcap.1.html
-
-
-
Editcap1
-
39
-
-
59949096619
-
-
http://www.wireshark.org/docs/man-pages/editcap.html
-
Tshark,. http://www.wireshark.org/docs/man-pages/editcap.html
-
-
-
Tshark1
-
41
-
-
27844454587
-
-
New York, NY, USA Columbia University
-
Stolfo S., Fan W., Lee W., Prodromidis A., Chan P. K., Cost-based modeling for fraud and intrusion detection results from the JAM project 2000 New York, NY, USA Columbia University
-
(2000)
Cost-based modeling for fraud and intrusion detection results from the JAM project
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
43
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh J., Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory ACM Transactions on Information and System Security 2000 3 4 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
44
-
-
33744779904
-
-
Proceedings of the 4th International Conference on Cryptology and Network Security (CANS 05) December 2005 Xiamen, China Springer Lecture Notes in Computer Science
-
Lu W., Traore I., A novel unsupervised anomaly detection framework for detecting network attacks in real-time 3810 Proceedings of the 4th International Conference on Cryptology and Network Security (CANS 05) December 2005 Xiamen, China Springer 96 109 Lecture Notes in Computer Science
-
A novel unsupervised anomaly detection framework for detecting network attacks in real-time
, vol.3810
, pp. 96-109
-
-
Lu, W.1
Traore, I.2
-
45
-
-
59949099179
-
-
http://www.fred-ezone.ca
-
Fred-eZone WiFi ISP,. http://www.fred-ezone.ca
-
-
-
Wifi Isp, F.1
-
46
-
-
59949099633
-
-
Proceedings of the 3rd SIAM International Conference on Data Mining (SDM 03) May 2003 San Francisco, Calif, USA
-
Lazarevic A., Ertoz L., Kumar V., Ozgur A., Srivastava J., A comparative study of anomaly detection schemes in network intrusion detection Proceedings of the 3rd SIAM International Conference on Data Mining (SDM 03) May 2003 San Francisco, Calif, USA 108 120
-
A comparative study of anomaly detection schemes in network intrusion detection
, pp. 108-120
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
47
-
-
27144518261
-
-
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop November 2003 Melbourne, Fla, USA
-
Shyu M. L., Chen S. C., Sarinnapakorn K., Chang L., A novel anomaly detection scheme based on principal component classifier Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop November 2003 Melbourne, Fla, USA 172 179
-
A novel anomaly detection scheme based on principal component classifier
, pp. 172-179
-
-
Shyu, M.L.1
Chen, S.C.2
Sarinnapakorn, K.3
Chang, L.4
-
49
-
-
59949083097
-
-
Denial-of-service tools - Advisory CA-1999-17, December 1999, http://www.cert.org/advisories/CA-1999-17.html
-
CERT Coordination Center,. Denial-of-service tools-Advisory CA-1999-17, December 1999, http://www.cert.org/advisories/CA-1999-17.html
-
-
-
Coordination Center, C.1
|