-
1
-
-
3042742908
-
An analysis of the Slapper worm
-
Arce, I. and Levy, E. (2003) 'An analysis of the Slapper worm', Security and Privacy Magazine, IEEE, Vol. 1, pp.82-87.
-
(2003)
Security and Privacy Magazine, IEEE
, vol.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
2
-
-
33845564966
-
A Hybrid Honeypot Architecture for Scalable Network Monitoring
-
Department of Electrical Engineering, University of Michigan
-
Bailey, M., Cooke, E., Watson, D., Jahanian, F. and Provos, N. (2004) A Hybrid Honeypot Architecture for Scalable Network Monitoring, Department of Electrical Engineering, University of Michigan, Technical Report CSE-TR, pp.499-504.
-
(2004)
Technical Report CSE-TR
, pp. 499-504
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Provos, N.5
-
3
-
-
2942640996
-
Data mining for network intrusion detection
-
Baltimore
-
Dokas, P., Ertoz, L., Kumar, V., Lazarevic, A., Srivastava, J. and Tan, P. (2002) 'Data mining for network intrusion detection', Proceedings of NSF Workshop on Next Generation Data Mining, Baltimore.
-
(2002)
Proceedings of NSF Workshop on Next Generation Data Mining
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.6
-
5
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L. and Stolfo, S. (2002) 'A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data', Applications of Data Mining in Computer Security, Kluwer.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
6
-
-
0038537231
-
An immuno-fuzzy approach to anomaly detection
-
Gomez, J., Gonzalez, F. and Dasgupta, D. (2003) 'An immuno-fuzzy approach to anomaly detection', The 12th IEEE International Conference on Fuzzy Systems, Vol. 2, pp.1219-1224.
-
(2003)
The 12th IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 1219-1224
-
-
Gomez, J.1
Gonzalez, F.2
Dasgupta, D.3
-
7
-
-
0141540496
-
Y-means: A clustering method for intrusion detection
-
Montreal, Canada
-
Guan, Y., Ghorbani, A. and Belacel, N. (2003) 'Y-means: A clustering method for intrusion detection', Proceeding of IEEE Canadian Conference on Electrical and Computer Engineering, Montreal, Canada, Vol. 2, pp.1083-1086.
-
(2003)
Proceeding of IEEE Canadian Conference on Electrical and Computer Engineering
, vol.2
, pp. 1083-1086
-
-
Guan, Y.1
Ghorbani, A.2
Belacel, N.3
-
9
-
-
84858092916
-
-
Honeyd (2006) World Wide Web, http://www.honeyd.org
-
(2006)
World Wide Web
-
-
-
10
-
-
61849143069
-
-
IDSeval (1998) World Wide Web, http://www.ll.mit.edu/mission/ communications/ist/corpora/ideval/docs/index.html
-
(1998)
World Wide Web
-
-
IDSeval1
-
11
-
-
33845567241
-
Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms
-
Department of Computer Science, Purdue University
-
Jiang, X. and Xu, D. (2005) Behavioral Footprinting: A New Dimension to Characterize Self-Propagating Worms, Department of Computer Science, Purdue University, Technical Report CSD TR, pp.5-27.
-
(2005)
Technical Report CSD TR
, pp. 5-27
-
-
Jiang, X.1
Xu, D.2
-
12
-
-
61849180125
-
-
KDDcup (1999) World Wide Web, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html
-
(1999)
World Wide Web
-
-
KDDcup1
-
13
-
-
33645791274
-
Honeycomb: Creating intrusion detection signatures using honeypots
-
Kreibich, C. and Crowcroft, J. (2004) 'Honeycomb: Creating intrusion detection signatures using honeypots', ACM SIGCOMM Computer Communication Review, Vol. 34, pp.51-56.
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
14
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Anaheim, CA, USA
-
Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S. and Zhang, J. (2001) 'Real time data mining-based intrusion detection', Proceedings of DISCEX II, Anaheim, CA, USA, Vol. 1, pp.89-100.
-
(2001)
Proceedings of DISCEX II
, vol.1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
15
-
-
33744779904
-
A new unsupervised anomaly detection framework for detecting network attacks in real-time
-
Lu, W. and Traore, I. (2005) 'A new unsupervised anomaly detection framework for detecting network attacks in real-time', Lecture Notes in Computer Science, Vol. 3810, p.96.
-
(2005)
Lecture Notes in Computer Science
, vol.3810
, pp. 96
-
-
Lu, W.1
Traore, I.2
-
16
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
Berkeley, CA, USA
-
MacQueen, J. (1967) 'Some methods for classification and analysis of multivariate observations', Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, Berkeley, CA, USA, Vol. 1, pp.281-297.
-
(1967)
Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability
, vol.1
, pp. 281-297
-
-
MacQueen, J.1
-
17
-
-
3042692201
-
J-Honeypot: A java-based network deception tool with monitoring and intrusion detection
-
Las Vegas, NV, USA
-
Mai, Y., Upadrashta, R. and Su, X. (2004) 'J-Honeypot: A java-based network deception tool with monitoring and intrusion detection', Proceedings of International Conference on Information Technology: Coding and Computing, Las Vegas, NV, USA, Vol. 1, pp.804-808.
-
(2004)
Proceedings of International Conference on Information Technology: Coding and Computing
, vol.1
, pp. 804-808
-
-
Mai, Y.1
Upadrashta, R.2
Su, X.3
-
18
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory
-
McHugh, J. (2000) 'Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory', ACM Transactions on Information and System Security, Vol. 3, No. 4, pp.262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
19
-
-
84858092916
-
-
NetworkComputing
-
NetworkComputing (2006) World Wide Web, http://www.network computing.com/alertcon/
-
(2006)
World Wide Web
-
-
-
20
-
-
84858092916
-
-
Norton, (2006) World Wide Web, http://www.norton.com
-
(2006)
World Wide Web
-
-
-
21
-
-
27544493249
-
An experimental evaluation to determine if port scans are precursors to an attack
-
Yokohama, Japan, pp
-
Panjwani, S., Tan, S., Jarrin, K. and Cukier, M. (2005) 'An experimental evaluation to determine if port scans are precursors to an attack', Proceedings of International Conference on Dependable Systems and Networks, Yokohama, Japan, pp.602-611.
-
(2005)
Proceedings of International Conference on Dependable Systems and Networks
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.3
Cukier, M.4
-
22
-
-
33749606368
-
-
Petrovic, S., Alvarez, G., Orfila, A. and Carbo, J. (2006) 'Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques', Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Hawaii, USA, 6, p.129.2.
-
Petrovic, S., Alvarez, G., Orfila, A. and Carbo, J. (2006) 'Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques', Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Hawaii, USA, Vol. 6, p.129.2.
-
-
-
-
23
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, USA, pp
-
Portnoy, L., Eskin, E. and Stolfo, S. (2001) 'Intrusion detection with unlabeled data using clustering', Proceedings of ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, PA, USA, pp.76-105.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
, pp. 76-105
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
25
-
-
84858092916
-
-
SANS
-
SANS (2006) World Wide Web, http://www.sans.org
-
(2006)
World Wide Web
-
-
-
26
-
-
61849114959
-
-
SANS: () World Wide Web
-
SANS:sUrvival (2006) World Wide Web, http://isc.sans.org/ survivaltime.html
-
(2006)
sUrvival
-
-
-
27
-
-
33750944389
-
HonIDS: Enhancing honeypot system with intrusion detection models
-
Royal Holloway, UK, p
-
Tang, Y., Hu, H., Lu, X. and Wang, J. (2006) 'HonIDS: Enhancing honeypot system with intrusion detection models', Proceedings of the Fourth IEEE International Workshop on Information Assurance, Royal Holloway, UK, p.9.
-
(2006)
Proceedings of the Fourth IEEE International Workshop on Information Assurance
, pp. 9
-
-
Tang, Y.1
Hu, H.2
Lu, X.3
Wang, J.4
-
28
-
-
0242456133
-
An empirical analysis of NATE: Network analysis of anomalous traffic events
-
Virginia Beach, VA, USA, pp
-
Taylor, C. and Alves-Foss, J. (2002) 'An empirical analysis of NATE: network analysis of anomalous traffic events', Proceedings of the 2002 Workshop on New Security Paradigms, Virginia Beach, VA, USA, pp.18-26.
-
(2002)
Proceedings of the 2002 Workshop on New Security Paradigms
, pp. 18-26
-
-
Taylor, C.1
Alves-Foss, J.2
-
29
-
-
61849177316
-
-
Master Thesis, Eurecom Institute, University of Nice Sophia-Antipolis and Information Security Institute, Queensland University of Technology
-
Tber, R. (2005) A Practical Comparison of Low and High Interactivity Honeypots, Master Thesis, Eurecom Institute, University of Nice Sophia-Antipolis and Information Security Institute, Queensland University of Technology.
-
(2005)
A Practical Comparison of Low and High Interactivity Honeypots
-
-
Tber, R.1
-
30
-
-
61849164845
-
HoneyAnalyzer - analysis and extraction of intrusion detection patterns & signatures using honeypot
-
Dubai, UAE
-
Thakar, U., Varma, S. and Ramani, A. (2005) 'HoneyAnalyzer - analysis and extraction of intrusion detection patterns & signatures using honeypot', Proceedings of the Second International Conference on Innovations in Information Technology, Dubai, UAE.
-
(2005)
Proceedings of the Second International Conference on Innovations in Information Technology
-
-
Thakar, U.1
Varma, S.2
Ramani, A.3
-
31
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Sophia Antipolis, France, pp
-
Wang, K. and Stolfo, S. (2004) 'Anomalous payload-based network intrusion detection', Proceedings of the Seventh International Symposium on Recent Advance in Intrusion Detection, Sophia Antipolis, France, pp.203-222.
-
(2004)
Proceedings of the Seventh International Symposium on Recent Advance in Intrusion Detection
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.2
-
32
-
-
84858092916
-
-
Weka (2006) World Wide Web, http://www.cs.waikato.ac.nz/ml/weka
-
(2006)
World Wide Web
-
-
Weka1
-
33
-
-
70350322899
-
-
Wireshark (2005) World Wide Web, http://www.wireshark.org
-
(2005)
World Wide Web
-
-
-
34
-
-
0003957032
-
-
Morgan Kaufmann Publishers, San Fancisco, CA, USA
-
Witten, I. and Frank, E. (1999) Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations, Morgan Kaufmann Publishers, San Fancisco, CA, USA.
-
(1999)
Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.1
Frank, E.2
-
35
-
-
5044231297
-
Honeypot and scan detection in intrusion detection system
-
Niagara Falls, Ontario, Canada, pp
-
Yin, C., Li, M., Ma, J. and Sun, J. (2004) 'Honeypot and scan detection in intrusion detection system', Canadian Conference on Electrical and Computer Engineering, Vol. 2, Niagara Falls, Ontario, Canada, pp.1107-1110.
-
(2004)
Canadian Conference on Electrical and Computer Engineering
, vol.2
, pp. 1107-1110
-
-
Yin, C.1
Li, M.2
Ma, J.3
Sun, J.4
-
36
-
-
33845876880
-
A clustering approach to wireless network intrusion detection
-
Honk Kong, China, pp
-
Zhong, S., Khoshgoftaar, T. and Nath, S. (2005) 'A clustering approach to wireless network intrusion detection', 17th IEEE International Conference on Tools with Artificial Intelligence, Honk Kong, China, pp.190-196.
-
(2005)
17th IEEE International Conference on Tools with Artificial Intelligence
, pp. 190-196
-
-
Zhong, S.1
Khoshgoftaar, T.2
Nath, S.3
|