-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
November
-
Paul Barford, Jeffery Kline, David Plonka, and Amos Ron, "A signal analysis of network traffic anomalies," In IMW, pp. 71-82, November 2002.
-
(2002)
IMW
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
2
-
-
70349098688
-
An image processing approach to traffic anomaly detection
-
Bangkok, Thailand, November 18-20
-
Romain Fontugne, Toshio Hirotsu, Kensuke Fukuda, "An image processing approach to traffic anomaly detection," In Proc. Of 8th Asian Internet Engineering Conference (AINTEC 2008), pp.17-26, Bangkok, Thailand, November 18-20, 2008.
-
(2008)
Proc. of 8th Asian Internet Engineering Conference (AINTEC 2008
, pp. 17-26
-
-
Fontugne, R.1
Hirotsu, T.2
Fukuda, K.3
-
3
-
-
62349121593
-
LD2: A system for lightweight detection of denial-of-service attacks
-
Conventional Center, San Diego, CA, USA, 17-19 November
-
Sirikarn Pukkawanna, Panita Pongpaibool, and Vasaka Visoottiviseth, "LD2: A System for Lightweight Detection of Denial-Of-Service Attacks", In Proc. of MILCOM 2008, Conventional Center, San Diego, CA, USA, 17-19 November, 2008
-
(2008)
Proc. of MILCOM 2008
-
-
Pukkawanna, S.1
Pongpaibool, P.2
Visoottiviseth, V.3
-
5
-
-
0012292276
-
A neural network approach towards intrusion detection
-
July
-
K. Fox, R. Henning, J. Reed, and R. Simonian, "A neural network approach towards intrusion detection", In Proc. 13th National Computer Security Conference, pp. 124-134, July 1990.
-
(1990)
Proc. 13th National Computer Security Conference
, pp. 124-134
-
-
Fox, K.1
Henning, R.2
Reed, J.3
Simonian, R.4
-
7
-
-
11844281602
-
-
Technical Report, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901, March
-
Matthew V. Mahoney, Philip K. Chan, and Muhammad H. Arshad, "A machine learning approach to anomaly detection", Technical Report, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901, March 2003.
-
(2003)
A Machine Learning Approach to Anomaly Detection
-
-
Mahoney, M.V.1
Chan, P.K.2
Arshad, M.H.3
-
9
-
-
78650098476
-
Sketch-based change detection: Methods, evaluation, and applications
-
October
-
B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications," In ACM IMC, October 2003.
-
(2003)
ACM IMC
-
-
Krishnamurty, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
10
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedure
-
August
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, "Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedure," In ACM SIGCOMM LSAD'07, pp. 145-152, August 2007.
-
(2007)
ACM SIGCOMM LSAD'07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
11
-
-
77954320174
-
Detection and identification of network anomalies using sketch subspaces
-
October
-
X. Li et al, "Detection and identification of network anomalies using sketch subspaces", In ACM IMC, October 2006.
-
(2006)
ACM IMC
-
-
Li, X.1
-
12
-
-
38149030783
-
Nada - Network anomaly detection algorithm
-
S. Farraposo, P. Owezarski, and E. Monteiro, "Nada - network anomaly detection algorithm," In DSOM '07, 4785:191-194, 2007.
-
(2007)
DSOM '07
, vol.4785
, pp. 191-194
-
-
Farraposo, S.1
Owezarski, P.2
Monteiro, E.3
-
15
-
-
78650127009
-
-
Sasser port
-
Sasser port, https://tools.cisco.com/security/center/viewAlert.x?alertId= 7608
-
-
-
-
16
-
-
78650146395
-
-
Worm port, http://en.wikipedia.org/wiki/Sasser-%28computer-worm%29
-
-
-
-
17
-
-
78650154485
-
-
Worm port
-
Worm port, http://reviews.cnet.com/4520-6600-7-5133023-1.html
-
-
-
|