-
2
-
-
78650876301
-
A data mining framework for building intrusion detection models
-
Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE S&P (1999)
-
(1999)
IEEE S&P
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
3
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
4
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Valdes, A., Zamboni, D. (eds.) RAID 2005. Springer, Heidelberg
-
Wang, K., Cretu, G.F., Stolfo, S.J.: Anomalous payload-based worm detection and signature generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 227-246. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3858
, pp. 227-246
-
-
Wang, K.1
Cretu, G.F.2
Stolfo, S.J.3
-
5
-
-
0001883632
-
A sense of self for unix processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: IEEE S&P (1996)
-
(1996)
IEEE S&P
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
55949124178
-
Fast intrusion detection based on a non-negative matrix factorization model
-
Guan, X., Wang, W., Zhang, X.: Fast intrusion detection based on a non-negative matrix factorization model. J. Network and f Applications 32(1), 31-44 (2009)
-
(2009)
J. Network and F Applications
, vol.32
, Issue.1
, pp. 31-44
-
-
Guan, X.1
Wang, W.2
Zhang, X.3
-
7
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
Wang, W., Guan, X., Zhang, X., Yang, L.: Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Computers & Security 25(7), 539-550 (2006)
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
9
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Inf. Process. Lett. 76(1-2) (2000)
-
(2000)
Inf. Process. Lett.
, vol.76
, Issue.1-2
-
-
Schonlau, M.1
Theus, M.2
-
10
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications 31(1), 58-72 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
11
-
-
38149142569
-
Comparing anomaly detection techniques for http
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for http. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 42-62. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
12
-
-
14844319067
-
Anomaly detection of web-based attacks
-
Krügel, C., Vigna, G.: Anomaly detection of web-based attacks. In: ACM CCS (2003)
-
(2003)
ACM CCS
-
-
Krügel, C.1
Vigna, G.2
-
13
-
-
85180633963
-
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
-
Song, Y., Keromytis, A.D., Stolfo, S.J.: Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic. In: NDSS (2009)
-
(2009)
NDSS
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.J.3
-
14
-
-
36849087003
-
Using generalization and characterization techniques in the anomaly-based detection of web attacks
-
Robertson, W.K., Vigna, G., Krügel, C., Kemmerer, R.A.: Using generalization and characterization techniques in the anomaly-based detection of web attacks. In: NDSS
-
NDSS
-
-
Robertson, W.K.1
Vigna, G.2
Krügel, C.3
Kemmerer, R.A.4
-
15
-
-
77953294708
-
A signal-processing view on packet sampling and anomaly detection
-
Brauckhoff, D., Salamatian, K., May, M.: A signal-processing view on packet sampling and anomaly detection. In: INFOCOM (2010)
-
(2010)
INFOCOM
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
16
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
Brauckhoff, D., Tellenbach, B.,Wagner, A., Lakhina, A., May, M.: Impact of packet sampling on anomaly detection metrics. In: Internet Measurement Conference, IMC (2006)
-
Internet Measurement Conference, IMC (2006)
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
Lakhina, A.4
May, M.5
-
17
-
-
33847172327
-
Clustering by passing messages between data points
-
Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972-976 (2007)
-
(2007)
Science
, vol.315
, Issue.5814
, pp. 972-976
-
-
Frey, B.J.1
Dueck, D.2
-
19
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E.: An intrusion-detection model. IEEE Trans. Software Eng. 13(2), 222-232 (1987)
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
21
-
-
78650879385
-
Casting out demons: Sanitizing training data for anomaly sensors
-
Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D.: Casting out demons: Sanitizing training data for anomaly sensors. In: IEEE S&P (2008)
-
(2008)
IEEE S&P
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
22
-
-
78650924299
-
-
retrieved March 2009
-
KDD-Data: Kdd cup 1999 data (1999), http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html (retrieved March 2009)
-
(1999)
KDD-Data: Kdd Cup 1999 Data
-
-
-
23
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Shyu, M., Chen, S., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. In: IEEE Foundations and New Directions of Data Mining Workshop (2003)
-
IEEE Foundations and New Directions of Data Mining Workshop (2003)
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
25
-
-
51849104745
-
Towards fast detecting intrusions: Using key attributes of network traffic
-
July
-
Wang, W., Gombault, S., Guyet, T.: Towards fast detecting intrusions: using key attributes of network traffic. In: ICIMP (July 2008)
-
(2008)
ICIMP
-
-
Wang, W.1
Gombault, S.2
Guyet, T.3
-
26
-
-
77951563176
-
Optimizing network anomaly detection scheme using instance selection mechanism
-
IEEE Press, Los Alamitos
-
Li, Y., Lu, T.B., Guo, L., Tian, Z.H., Qi, L.: Optimizing network anomaly detection scheme using instance selection mechanism. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, Piscataway, NJ, USA, pp. 425-431. IEEE Press, Los Alamitos (2009)
-
(2009)
Proceedings of the 28th IEEE Conference on Global Telecommunications, GLOBECOM 2009, Piscataway, NJ, USA
, pp. 425-431
-
-
Li, Y.1
Lu, T.B.2
Guo, L.3
Tian, Z.H.4
Qi, L.5
-
27
-
-
71749108310
-
Constructing attribute weights from computer audit data for effective intrusion detection
-
Wang,W., Zhang, X., Gombault, S.: Constructing attribute weights from computer audit data for effective intrusion detection. J. Sys. and Soft. 82(12) (2009)
-
(2009)
J. Sys. and Soft.
, vol.82
, Issue.12
-
-
Wang, W.1
Zhang, X.2
Gombault, S.3
-
28
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Computation 13(7), 1443-1471 (2001)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
29
-
-
33750516723
-
Adaptive anomaly detection with evolving connectionist systems
-
Liao, Y., Vemuri, V.R., Pasos, A.: Adaptive anomaly detection with evolving connectionist systems. J. Network and Computer Applications 30(1) (2007)
-
(2007)
J. Network and Computer Applications
, vol.30
, Issue.1
-
-
Liao, Y.1
Vemuri, V.R.2
Pasos, A.3
-
32
-
-
56049108623
-
Data streaming with affinity propagation
-
Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part II. Springer, Heidelberg
-
Zhang, X., Furtlehner, C., Sebag, M.: Data streaming with affinity propagation. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part II. LNCS (LNAI), vol. 5212, pp. 628-643. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.5212
, pp. 628-643
-
-
Zhang, X.1
Furtlehner, C.2
Sebag, M.3
-
33
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262-294 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
|