-
1
-
-
33947634049
-
A DoS resilient flow-level intrusion detection approach for high-speed networks
-
Washington, DC, USA
-
Y. Gao, Z. Li, and Y. Chen, "A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks," in Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06), Washington, DC, USA, 2006, p. 39.
-
(2006)
Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06)
, pp. 39
-
-
Gao, Y.1
Li, Z.2
Chen, Y.3
-
2
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Berkeley, CA, USA
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proc. of the first conference on Hot Topics in Understanding Botnets (HotBots '07), Berkeley, CA, USA, 2007, p. 7.
-
(2007)
Proc. of the First Conference on Hot Topics in Understanding Botnets (HotBots '07)
, pp. 7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
3
-
-
77951130249
-
Architecture for applying data mining and visualization on network flow for botnet traffic detection
-
Washington, DC, USA
-
A. Shahrestani, M. Feily, R. Ahmad, and S. Ramadass, "Architecture for Applying Data Mining and Visualization on Network Flow for Botnet Traffic Detection," in Proc. of the International Conference on Computer Technology and Development (ICCTD '09), Washington, DC, USA, 2009, pp. 33-37.
-
(2009)
Proc. of the International Conference on Computer Technology and Development (ICCTD '09)
, pp. 33-37
-
-
Shahrestani, A.1
Feily, M.2
Ahmad, R.3
Ramadass, S.4
-
4
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer, "Using Machine Learning Techniques to Identify Botnet Traffic," in 2nd IEEE LCN Workshop on Network Security (WoNS '06), 2006, pp. 967-974.
-
(2006)
2nd IEEE LCN Workshop on Network Security (WoNS '06)
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
5
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
A. Sperotto et al., "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Communications Surveys Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
-
6
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R. P. Lippmann et al., "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation," in Proc. of the DARPA Information Survivability Conference and Exposition, 2000, pp. 12-26.
-
(2000)
Proc. of the DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
-
7
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
9
-
-
77049103625
-
A labeled data set for flow-based intrusion detection
-
Berlin, Heidelberg
-
A. Sperotto, R. Sadre, F. Vliet, and A. Pras, "A Labeled Data Set for Flow-Based Intrusion Detection," in Proc. of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09), Berlin, Heidelberg, 2009, pp. 39-50.
-
(2009)
Proc. of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09)
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Vliet, F.3
Pras, A.4
-
10
-
-
36949007362
-
Challenging the anomaly detection paradigm a provocative discussion
-
DOI 10.1145/1278940.1278945, Proceedings - New Security Paradigms Workshop 2006
-
C. Gates and C. Taylor, "Challenging the anomaly detection paradigm: a provocative discussion," in Proc. of the 2006 workshop on New security paradigms (NSPW '06), New York, NY, USA, 2007, pp. 21-29. (Pubitemid 350239697)
-
(2007)
Proceedings New Security Paradigms Workshop
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
11
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
May
-
R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in IEEE Symposium on Security and Privacy (S&P), May 2010, pp. 305-316.
-
(2010)
IEEE Symposium on Security and Privacy (S&P)
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
12
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
DOI 10.1162/089976601750264965
-
B. Schölkopf et al., "Estimating the Support of a High-Dimensional Distribution," Neural Computation, vol. 13, no. 7, pp. 1443-1471, 2001. (Pubitemid 33595028)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
14
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
L. Khan, M. Awad, and B. Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering," The VLDB Journal, vol. 16, no. 4, pp. 507-521, 2007.
-
(2007)
The VLDB Journal
, vol.16
, Issue.4
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
15
-
-
79952855984
-
-
"Grml," http://www.grml.org.
-
-
-
-
16
-
-
79952850718
-
-
"tcpdump / libpcap," http://www.tcpdump.org.
-
-
-
-
17
-
-
79952857486
-
-
"softflowd," http://www.mindrot.org/projects/softflowd/.
-
Softflowd
-
-
-
19
-
-
71049134473
-
Simultaneous feature selection and LS-SVM parameters optimization algorithm based on PSO
-
Washington, DC, USA
-
Q.-Z. Yao, J. Cai, and J.-L. Zhang, "Simultaneous Feature Selection and LS-SVM Parameters Optimization Algorithm Based on PSO," in Proc. of the WRI World Congress on Computer Science and Information Engineering (CSIE '09), Washington, DC, USA, 2009, pp. 723-727.
-
(2009)
Proc. of the WRI World Congress on Computer Science and Information Engineering (CSIE '09)
, pp. 723-727
-
-
Yao, Q.-Z.1
Cai, J.2
Zhang, J.-L.3
-
20
-
-
34548119159
-
A SA-based feature selection and parameter optimization approach for support vector machine
-
S.-W. Lin, T.-Y. Tseng, S.-C. Chen, and J.-F. Huang, "A SA-Based Feature Selection and Parameter Optimization Approach for Support Vector Machine," in IEEE International Conference on Systems, Man and Cybernetics (SMC '06), vol. 4, 2006, pp. 3144-3145.
-
(2006)
IEEE International Conference on Systems, Man and Cybernetics (SMC '06)
, vol.4
, pp. 3144-3145
-
-
Lin, S.-W.1
Tseng, T.-Y.2
Chen, S.-C.3
Huang, J.-F.4
|