-
1
-
-
0013347631
-
-
Corporation, M.: accessed June 16, 2006
-
Corporation, M.: Common vulnerabilities and exposures, http://cve.mitre.org/ (accessed June 16, 2006)
-
Common Vulnerabilities and Exposures
-
-
-
2
-
-
21244492864
-
Low Volume Viruses: New Tools for Criminals
-
Kay, J.: Low Volume Viruses: New Tools for Criminals. Network Security, 16-18 (2005)
-
(2005)
Network Security
, pp. 16-18
-
-
Kay, J.1
-
4
-
-
78650895481
-
-
TippingPoint, http://www.tippingpoint.com/
-
-
-
-
5
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-time
-
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31, 2435-2463 (1999)
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
6
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
Patcha, A., Park, J.M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks 51, 3448-3470 (2007) (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
7
-
-
35048885009
-
Anomalous Payload-based Network Intrusion Detection
-
Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
-
Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
8
-
-
0037661195
-
Network Traffic Anomaly Detection Based on Packet Bytes
-
ACM, New York
-
Mahoney, M.V.: Network Traffic Anomaly Detection Based on Packet Bytes. In: The 2003 ACM Symposium on Applied Computing, pp. 346-350. ACM, New York (2003)
-
(2003)
The 2003 ACM Symposium on Applied Computing
, pp. 346-350
-
-
Mahoney, M.V.1
-
9
-
-
52449121182
-
Detection of Network Attack and Intrusion Using PCA-ICA
-
Shih, H.C., Ho, J.H., Chang, C.P., Pan, J.S., Liao, B.Y., Kuo, T.H.: Detection of Network Attack and Intrusion Using PCA-ICA. In: 3rd International Conference on Innovative Computing Information and Control, p. 564(2008)
-
(2008)
3rd International Conference on Innovative Computing Information and Control
, pp. 564
-
-
Shih, H.C.1
Ho, J.H.2
Chang, C.P.3
Pan, J.S.4
Liao, B.Y.5
Kuo, T.H.6
-
11
-
-
33845998197
-
Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
-
Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. Springer, Heidelberg
-
Chen, Y., Li, Y., Cheng, X.Q., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 153-167. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4318
, pp. 153-167
-
-
Chen, Y.1
Li, Y.2
Cheng, X.Q.3
Guo, L.4
-
12
-
-
0036038437
-
Service Specific Anomaly detection for Network Intrusion Detection
-
ACM, New York
-
Krugel, C., Toth, T., Kirda, E.: Service Specific Anomaly detection for Network Intrusion Detection. In: The 2002 ACM Symposium on Applied Computing, pp. 201-208. ACM, New York (2002)
-
(2002)
The 2002 ACM Symposium on Applied Computing
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
13
-
-
33750335757
-
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
-
Zamboni, D., Krügel, C. (eds.) RAID 2006. Springer, Heidelberg
-
Wang, K., Parekh, J., Stolfo, S.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4219
, pp. 226-248
-
-
Wang, K.1
Parekh, J.2
Stolfo, S.3
-
14
-
-
58049125337
-
Detection of Anomalous Network Packets Using Lightweight Stateless Payload Inspection
-
Nwanze, N., Summerville, D.: Detection of Anomalous Network Packets Using Lightweight Stateless Payload Inspection. In: The 33rd IEEE Conference on Local Computer Networks, pp. 911-918 (2008)
-
(2008)
The 33rd IEEE Conference on Local Computer Networks
, pp. 911-918
-
-
Nwanze, N.1
Summerville, D.2
-
15
-
-
79951924804
-
Network Intrusion Detection Based on LDA for Payload Feature Selection
-
IEEE Press, Los Alamitos to appear
-
Tan, Z., Jamdagni, A., Nanda, P., He, X.: Network Intrusion Detection Based on LDA for Payload Feature Selection. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security, pp. 1-5. IEEE Press, Los Alamitos (2010) (to appear)
-
(2010)
IEEE Globecom 2010 Workshop on Web and Pervasive Security
, pp. 1-5
-
-
Tan, Z.1
Jamdagni, A.2
Nanda, P.3
He, X.4
-
16
-
-
77955165142
-
Intrusion Detection Using GSAD Model for HTTP Traffic on Web Services
-
ACM, New York
-
Jamdagni, A., Tan, Z., Nanda, P., He, X., Liu, R.: Intrusion Detection Using GSAD Model for HTTP Traffic on Web Services. In: The 6th International Wireless Communications and Mobile Computing Conference, pp. 1193-1197. ACM, New York (2010)
-
(2010)
The 6th International Wireless Communications and Mobile Computing Conference
, pp. 1193-1197
-
-
Jamdagni, A.1
Tan, Z.2
Nanda, P.3
He, X.4
Liu, R.5
|