-
2
-
-
40249098707
-
Controlling the effects of anomalous ARP behaviour on Ethernet networks
-
Ármannsson D, Hjálmtýsson G, Smith PD, Mathy L (2005) Controlling the effects of anomalous ARP behaviour on Ethernet networks. In: Proc of the 2005 ACM conference on emerging network experiment and technology, 2005, pp 50-60
-
(2005)
Proc of the 2005 ACM Conference on Emerging Network Experiment and Technology, 2005
, pp. 50-60
-
-
Ármannsson, D.1
Hjálmtýsson, G.2
Smith, P.D.3
Mathy, L.4
-
4
-
-
40249111850
-
A multivariate adaptive method for detecting ARP anomaly in local area networks
-
Nov 2006
-
Farahmand M, Azarfar A, Jafari A, Zargari V (2006) A multivariate adaptive method for detecting ARP anomaly in local area networks. In: International conference on systems and networks communication (ICSNC'06), Nov 2006, pp 53-59
-
(2006)
International Conference on Systems and Networks Communication (ICSNC'06)
, pp. 53-59
-
-
Farahmand, M.1
Azarfar, A.2
Jafari, A.3
Zargari, V.4
-
5
-
-
33847704184
-
K-Means+ID3: A novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods
-
DOI 10.1109/TKDE.2007.44
-
SR Gaddam VV Phoha KS Balagani 2007 k-Means+ID3: a novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods IEEE Trans Knowl Data Eng 19 3 345 354 10.1109/TKDE.2007.44 (Pubitemid 46374532)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
7
-
-
55849135456
-
Protecting network-centric systems with joint anomaly and intrusion detection over Internet episodes
-
8 Oct 2004
-
Hwang K, Liu H, Chen Y (2004) Protecting network-centric systems with joint anomaly and intrusion detection over Internet episodes. In: IEEE IPDPS- 2005, 8 Oct 2004
-
(2004)
IEEE IPDPS- 2005
-
-
Hwang, K.1
Liu, H.2
Chen, Y.3
-
12
-
-
0036532571
-
Switching between selection and fusion in combining classifiers: An experiment
-
DOI 10.1109/3477.990871, PII S1083441902006970
-
LI Kuncheva 2002 Switching between selection and fusion in combining classifiers: an experiment IEEE Trans Sys Man Cybern 32 2 146 156 10.1109/3477.990871 (Pubitemid 34249373)
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.32
, Issue.2
, pp. 146-156
-
-
Kuncheva, L.I.1
-
13
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
May 2003
-
Lazarevic A, Ozgur A, Ertoz L, Srivastava J, Kumar V (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proc SIAM int'l conf data mining, May 2003
-
(2003)
Proc SIAM Int'l Conf Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
14
-
-
1642354876
-
KDD-99 classifier learning contest: LLSoft's results overview
-
Jan 2000
-
Levin I (2000) KDD-99 classifier learning contest: LLSoft's results overview. In: SIGKDD explorations, Jan 2000, vol 1, pp 67-75
-
(2000)
SIGKDD Explorations
, vol.1
, pp. 67-75
-
-
Levin, I.1
-
15
-
-
40249105985
-
Design and implementation of an anomaly detection system: An empirical approach
-
May 2003
-
Maselli G, Deri L (2003) Design and implementation of an anomaly detection system: an empirical approach. In: Proc of Terena TNC 2003, Zagreb, Croatia, May 2003
-
(2003)
Proc of Terena TNC 2003, Zagreb, Croatia
-
-
Maselli, G.1
Deri, L.2
-
19
-
-
2642522033
-
Symbolic dynamic analysis of complex systems for anomaly detection
-
1152.94353 10.1016/j.sigpro.2004.03.011
-
A Ray 2004 Symbolic dynamic analysis of complex systems for anomaly detection Signal Process 84 7 1115 1130 1152.94353 10.1016/j.sigpro.2004.03.011
-
(2004)
Signal Process
, vol.84
, Issue.7
, pp. 1115-1130
-
-
Ray, A.1
-
22
-
-
0043166339
-
Anomaly detection in IP networks
-
10.1109/TSP.2003.814797
-
M Thottan C Ji 2003 Anomaly detection in IP networks IEEE Trans Signal Process 51 8 2191 2204 10.1109/TSP.2003.814797
-
(2003)
IEEE Trans Signal Process
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
24
-
-
31844455886
-
ARP-based detection of scanning worms within an enterprise network
-
Whyte D, Kranakis E, Van Oorschot P (2005) ARP-based detection of scanning worms within an enterprise network. In: Proc of annual computer security applications conference (ACSAC 2005), Tucson, AZ, 5-9 Dec 2005
-
(2005)
Proc of Annual Computer Security Applications Conference (ACSAC 2005), Tucson, AZ, 5-9 Dec 2005
-
-
Whyte, D.1
Kranakis, E.2
Van Oorschot, P.3
-
26
-
-
77953621719
-
A stochastic learning automata-based algorithm for ARP anomaly detection in local area networks
-
(submitted)
-
Yasami Y, Pourmozaffari S, Khorsandi S (2009) A stochastic learning automata-based algorithm for ARP anomaly detection in local area networks, CSI J Comput Sci Eng (submitted)
-
(2009)
CSI J Comput Sci Eng
-
-
Yasami, Y.1
Pourmozaffari, S.2
Khorsandi, S.3
-
27
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
DOI 10.1109/TC.2002.1017701
-
N Ye SM Emran Q Chen S Vilbert 2002 Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Trans Comput 51 7 810 820 10.1109/TC.2002.1017701 (Pubitemid 34835448)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
28
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
10.1109/TR.2004.823851
-
N Ye Y Zhang CM Borror 2004 Robustness of the Markov-chain model for cyber-attack detection IEEE Trans Reliab 53 1 116 123 10.1109/TR.2004.823851
-
(2004)
IEEE Trans Reliab
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
30
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Zhang Z, Li J, Manikopoulos CN, Jorgenson J, Ucles J (2001) HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proc 2001 IEEE workshop information assurance, June 2001, pp 85-90
-
(2001)
Proc 2001 IEEE Workshop Information Assurance, June 2001
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
|