-
1
-
-
62849125514
-
Hackers take down the most wired country in europe
-
September
-
J. Davis, "Hackers take down the most wired country in europe," Wired, Vol. 15, no. 9, September 2007.
-
(2007)
Wired
, vol.15
, Issue.9
-
-
Davis, J.1
-
2
-
-
62849111634
-
When bots attack
-
September, 2007
-
J. Robb, "When bots attack," Wired, Vol. 15, no. 9, September, 2007 2007.
-
(2007)
Wired
, vol.15
, Issue.9
-
-
Robb, J.1
-
3
-
-
61649123904
-
-
[Online]. Available
-
J. Zhuge, T. Holz, S. Y. Han, J. Guo, and W. Zou, "Characterizing the irc-based botnet phenomenon," 2007. [Online]. Available: http://honeyblog.org/junkyard/reports/botnet-china-TR.pdf
-
Characterizing the Irc-Based Botnet Phenomenon," 2007
-
-
Zhuge, J.1
Holz, T.2
Han, S.Y.3
Guo, J.4
Zou, W.5
-
5
-
-
67650398412
-
-
steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '05)
-
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," 2005 2005, steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI '05).
-
(2005)
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
6
-
-
85093847546
-
-
uSENIX Workshop on Hot Topics in Understanding Botnets (HotBots '07)
-
J. B. Grizzard, V. Sharma, C. Nunnery, and B. B. Kang, "Peer-to-peer botnets: Overview and case study, 2007" 2007, uSENIX Workshop on Hot Topics in Understanding Botnets (HotBots '07).
-
(2007)
Peer-to-peer botnets: Overview and case study
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
-
7
-
-
67650349218
-
A taxonomy of botnet structures
-
W. Lee, C. Wang, and D. Dagon, Eds. Springer
-
D. Dagon, G. Gu, and C. Lee, "A taxonomy of botnet structures," in Botnet Detection: Countering the Largest Security Threat, ser. Advances in Information Security, W. Lee, C. Wang, and D. Dagon, Eds. Springer, 2008, pp. 143-164.
-
(2008)
Botnet Detection: Countering the Largest Security Threat, ser. Advances in Information Security
, pp. 143-164
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
-
8
-
-
0022582348
-
An intrusion-detection model
-
D. E. Denning, "An intrusion-detection model," IEEE Transactions on Software Engineering, Vol. 13, no. 2, pp. 118-131, 1986.
-
(1986)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 118-131
-
-
Denning, D.E.1
-
9
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Purdue University
-
S. Kumar and E. Spafford, "An application of pattern matching in intrusion detection," Purdue University, Tech. Rep., 1994.
-
(1994)
Tech. Rep.
-
-
Kumar, S.1
Spafford, E.2
-
10
-
-
27844484884
-
Intrusion detection: A survey
-
V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer
-
A. Lazarevic, V. Kumar, and J. Srivastava, "Intrusion detection: A survey," in Managing Cyber Threats, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer, 2005, pp. 19-78.
-
(2005)
Managing Cyber Threats
, pp. 19-78
-
-
Lazarevic, A.1
Kumar, V.2
Srivastava, J.3
-
13
-
-
51249194645
-
A logical calculus of the ideas immanent in nervous activity
-
W. S. McCulloch and W. Pitts, "A logical calculus of the ideas immanent in nervous activity," Bulletin of Mathematical Biophysics, Vol. 5, pp. 115-133, 1943.
-
(1943)
Bulletin of Mathematical Biophysics
, vol.5
, pp. 115-133
-
-
McCulloch, W.S.1
Pitts, W.2
-
17
-
-
72149083642
-
Computer network user behavior visualization using self-organizing maps
-
A. Hoglund and K. Hatonen, "Computer network user behavior visualization using self-organizing maps," in ICANN, 1998, pp. 899-904.
-
(1998)
ICANN
, pp. 899-904
-
-
Hoglund, A.1
Hatonen, K.2
-
21
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
DOI 10.1109/3468.935046, PII S1083442701054443, Information Assurance
-
H. Lee, "Training a neural-network based intrusion detector to recognize novel attacks," IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 31, pp. 294-299, 2001. (Pubitemid 33142055)
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
22
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
DOI 10.1109/TSMCC.2002.801356
-
S.-B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Systems Man Cybernet, Vol. 32, no. 2, p. 154, 2002. (Pubitemid 35289399)
-
(2002)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.-B.1
-
23
-
-
0033683805
-
A computer host based user anomaly detection system using the self organizing map
-
IEEE IJCNN
-
A. Hoglund, K. Hatonen, and A. Sorvari, "A computer host based user anomaly detection system using the self organizing map," in International Joint Conference on Neural Networks, IEEE IJCNN, Vol. 5, 2002, pp. 411-416.
-
(2002)
International Joint Conference on Neural Networks
, vol.5
, pp. 411-416
-
-
Hoglund, A.1
Hatonen, K.2
Sorvari, A.3
-
25
-
-
35248842651
-
Detecting Anomalous Network Traffic with Self-organizing Maps
-
Recent Advances in Intrusion Detection
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, ser. Lecture Notes in Computer Science, G. Vigna, E. Jonsson, and C. Kruegel, Eds., Vol. 2820. Pittsburgh, PA, USA: Springer-Verlag, 2003, pp. 36-54. (Pubitemid 37171491)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
27
-
-
48749120519
-
Intrusion detection system using self organizing map
-
L. Vokorokos, A. Balaz, and M. Chovanec, "Intrusion detection system using self organizing map," Acta Electrotechnica et Informatica, Vol. 6, no. 1, p. 6, 2006.
-
(2006)
Acta Electrotechnica et Informatica
, vol.6
, Issue.1
, pp. 6
-
-
Vokorokos, L.1
Balaz, A.2
Chovanec, M.3
-
29
-
-
17544388668
-
On the capability of an som based intrusion detection system
-
G. Kayacik, A. N. Zincir-Heywood, and M. I. Heywood, "On the capability of an som based intrusion detection system," in IEEE International Joint Conference on Neural Networks, 2003, pp. 1808-1813.
-
(2003)
IEEE International Joint Conference on Neural Networks
, pp. 1808-1813
-
-
Kayacik, G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
30
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
O. Depren, M. Topallar, E. Anarim, and M. Ciliz, "An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks," Expert Systems with Applications, Vol. 29, no. 4, pp. 713-722, 2005. (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
31
-
-
17444432965
-
Hierarchical Kohonenen Net for anomaly detection in network security
-
DOI 10.1109/TSMCB.2005.843274
-
S. T. Sarasamma, Q. Zhu, and J. Huff, "Hierarchical kohonenen net for anomaly detection in network security," IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, Vol. 35, no. 2, pp. 302-312, 2005. (Pubitemid 40535913)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
32
-
-
33750136508
-
Training the SOFM efficiently: An example from intrusion detection
-
DOI 10.1109/IJCNN.2005.1556113, 1556113, Proceedings of the International Joint Conference on Neural Networks, IJCNN 2005
-
L. Wetmore, A. N. Zincir-Heywood, and M. Heywood, "Training the sofm efficiently: An example from intrusion detection," in IEEE Internation Joing Conference on Neural Networks, IJCNN 2005, 2005, pp. 1575-1580. (Pubitemid 44591437)
-
(2005)
Proceedings of the International Joint Conference on Neural Networks
, vol.3
, pp. 1575-1580
-
-
Wetmore, L.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
33
-
-
67650386290
-
Using self-organizing maps to build and attack map for forensic analysis
-
Security, and Trust (PST 2006)
-
H. G. Kayacik and A. N. Zincir-Heywood, "Using self-organizing maps to build and attack map for forensic analysis," in ACM International Conference on Privacy, Security, and Trust (PST 2006), 2006, pp. 285-293.
-
(2006)
ACM International Conference on Privacy
, pp. 285-293
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
-
36
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows with hidden markov model
-
S.-B. Cho and H.-J. Park, "Efficient anomaly detection by modeling privilege flows with hidden markov model," Computers and Security, Vol. 22, no. 1, pp. 45-55, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.-B.1
Park, H.-J.2
-
37
-
-
33847137650
-
Modeling network intrusion detection alerts for correlation
-
DOI 10.1145/1210263.1210267
-
J. Zhou, M. Heckman, B. Reynolds, A. Carlson, and M. Bishop, "Modeling network intrusion detection alerts for correlation," ACM Transactions on Information and System Security (TISSEC), Vol. 10, no. 1, 2007. (Pubitemid 46279179)
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.1
, pp. 4
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
-
38
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Transactions on Information and System Security, Vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
|