-
3
-
-
0003882343
-
-
M. Press, Ed.Cambridge, MA, USA
-
J. R. Koza, "Genetic Programming: On the Programming of Computers", M. Press, Ed.Cambridge, MA, USA, 1992.
-
(1992)
Genetic Programming: On the Programming of Computers
-
-
Koza, J.R.1
-
4
-
-
79952941398
-
Modeling NIDS evasion with Genetic Programming
-
S. Pastrana, A. Orfila, and A. Ribagorda, "Modeling NIDS evasion with Genetic Programming", on the Proceedings of The 2010 International Conference on Security and Management, SAM 2010, Las Vegas, Nevada, USA, July 11-15, 2010
-
On the Proceedings of the 2010 International Conference on Security and Management, SAM 2010, Las Vegas, Nevada, USA, July 11-15, 2010
-
-
Pastrana, S.1
Orfila, A.2
Ribagorda, A.3
-
5
-
-
84889160249
-
-
Online
-
D. Son. (2002) Fragroute. [Online]. http://www.monkey.org/~dugsong/ fragroute/
-
(2002)
Fragroute
-
-
Son, D.1
-
6
-
-
49949107014
-
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems
-
L. Juan, C. Kreibich, C.-H. Lin, and V. Paxson, "A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems," in DIMVA '08: Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Paris, France, 2008, pp. 267-278.
-
DIMVA '08: Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, Paris, France, 2008
, pp. 267-278
-
-
Juan, L.1
Kreibich, C.2
Lin, C.-H.3
Paxson, V.4
-
7
-
-
2442501519
-
Protocol scrubbing: Network security through transparent flow modification
-
D. Watson, M. Smart, R. G. Malan, and F. Jahanian, "Protocol scrubbing: network security through transparent flow modification," IEEE/ACM Transactions on Networking, vol. 12, pp. 261-273, 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, pp. 261-273
-
-
Watson, D.1
Smart, M.2
Malan, R.G.3
Jahanian, F.4
-
8
-
-
85084160972
-
Network instrusion detection: Evasion, traffic normalization and end-to-end protocol semantics
-
M. Handley, C. Kreibich, and V. Paxson, "Network instrusion detection: Evasion, traffic normalization and end-to-end protocol semantics," in Proceedings of the 10th Conference on USENIX Security Symposium-Volume 10, 2001, p. 9.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium
, vol.10
, pp. 9
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
9
-
-
50249136649
-
Efficient and Robust TCP Stream Normalization
-
M. Vutukuru, H. Balakrishnan, and V. Paxson, "Efficient and Robust TCP Stream Normalization," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2008, pp. 96-110.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA
, pp. 96-110
-
-
Vutukuru, M.1
Balakrishnan, H.2
Paxson, V.3
-
10
-
-
33750316215
-
Detecting evasion attacks at high speeds without reassembly
-
G. Varghese, J. A. Fingerhut, and F. Bonomi, "Detecting evasion attacks at high speeds without reassembly," in SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, Pisa, Italy, 2006, pp. 327-338.
-
(2006)
SIGCOMM '06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy
, pp. 327-338
-
-
Varghese, G.1
Fingerhut, J.A.2
Bonomi, F.3
-
11
-
-
0038825042
-
Active Mapping: Resisting NIDS Evasion without Altering Traffic
-
U. Shankar and V. Paxson, "Active Mapping: Resisting NIDS Evasion without Altering Traffic," in SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA, 2003, p. 44.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, Washington, DC, USA
, pp. 44
-
-
Shankar, U.1
Paxson, V.2
-
12
-
-
85090433665
-
Snort - Lightweight Intrusion Detection for Networks
-
M. Roesch, "Snort - Lightweight Intrusion Detection for Networks," in LISA '99: Proceedings of the 13th USENIX conference on System administration, Seattle, Washington, 1999, pp. 229-238.
-
LISA '99: Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, 1999
, pp. 229-238
-
-
Roesch, M.1
-
13
-
-
65249112685
-
Counting Bloom Filters for Pattern Matching and Anti-Evasion at the Wire Speed
-
G. Antichi, D. Ficara, S. Giordano, G. Procissi, and F. Vitucci, "Counting Bloom Filters for Pattern Matching and Anti-Evasion at the Wire Speed," IEEE Network Magazine of Global Internetworking, vol. 23, no. 1, pp. 30-35, 2009.
-
(2009)
IEEE Network Magazine of Global Internetworking
, vol.23
, Issue.1
, pp. 30-35
-
-
Antichi, G.1
Ficara, D.2
Giordano, S.3
Procissi, G.4
Vitucci, F.5
-
14
-
-
33751040190
-
Reverse Engineering of Network Signatures
-
D. Mutz, C. Kruegel, W. Robertson, G. Vigna, and R. A. Kemmerer "Reverse Engineering of Network Signatures", in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold, 2005
-
Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, Gold, 2005
-
-
Mutz, D.1
Kruegel, C.2
Robertson, W.3
Vigna, G.4
Kemmerer, R.A.5
-
15
-
-
67650677051
-
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
-
A. Orfila, J. M. Estevez-Tapiador, and A. Ribagorda, "Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming," in EvoWorkshops '09: Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing, Tübingen, Germany, 2009, pp. 93-98.
-
(2009)
EvoWorkshops '09: Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing, Tübingen, Germany
, pp. 93-98
-
-
Orfila, A.1
Estevez-Tapiador, J.M.2
Ribagorda, A.3
-
16
-
-
79952943499
-
-
Krakow, Poland
-
J. Blasco, A. Orfila, and A. Ribagorda, "Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming," in , Krakow, Poland, 2010.
-
(2010)
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming
-
-
Blasco, J.1
Orfila, A.2
Ribagorda, A.3
-
17
-
-
27244445673
-
GP Ensemble for Distributed Intrusion Detection Systems
-
G. Folino, C. Pizzuti, and G. Spezzano, "GP Ensemble for Distributed Intrusion Detection Systems," in ICAPR, 2005, pp. 54-62.
-
(2005)
ICAPR
, pp. 54-62
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
18
-
-
9444267133
-
Modeling intrusion detection systems using linear genetic programming approach
-
S. Mukkamala, A. Sung, and A. Abrham, "Modeling intrusion detection systems using linear genetic programming approach," in IEA/AIE'2004: Proceedings of the 17th international conference on Innovations in applied artificial intelligence, Ottawa, 2004, pp. 633-642.
-
(2004)
IEA/AIE'2004: Proceedings of the 17th International Conference on Innovations in Applied Artificial Intelligence, Ottawa
, pp. 633-642
-
-
Mukkamala, S.1
Sung, A.2
Abrham, A.3
-
19
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
S. Peddabachigari, A. Ajith, C. Grosan, and J. Thomas, "Modeling intrusion detection system using hybrid intelligent systems," Journal in Network Computer Applications, vol. 30, no. 1, pp. 114-132, 2007.
-
(2007)
Journal in Network Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Ajith, A.2
Grosan, C.3
Thomas, J.4
-
21
-
-
85164392958
-
A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
-
R. Kohavi, "A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection", in IJCAI: International Joint Conference on Artificial Intelligence, Volume 2, Issue 1, 1137-1143, 1995
-
(1995)
IJCAI: International Joint Conference on Artificial Intelligence
, vol.2
, Issue.1
, pp. 1137-1143
-
-
Kohavi, R.1
-
23
-
-
79952934109
-
-
Lawrence Berkley National Laboratory and ICSI. Online
-
Lawrence Berkley National Laboratory and ICSI. (2005) LBNL/ICSI Enterprise Tracing Project. [Online]. www.icir.org/entreprise-tracing/
-
(2005)
LBNL/ICSI Enterprise Tracing Project
-
-
-
25
-
-
2942680824
-
Results of DARPA 1998 offline intrusion detection evaluation
-
I. Fraf, R. Lippmann, R. Cunningham, D. Fried, J. Kendall, S. Webster, and M. Zissman, "Results of DARPA 1998 offline intrusion detection evaluation", 1998, DARPPA PI Meeting, Cambridge, Massachusetts, USA.
-
(1998)
DARPPA PI Meeting, Cambridge, Massachusetts, USA
-
-
Fraf, I.1
Lippmann, R.2
Cunningham, R.3
Fried, D.4
Kendall, J.5
Webster, S.6
Zissman, M.7
-
26
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S.J. Stolfo. "A framework for constructing features and models for intrusion detection systems", ACM Transactions on Information and System Security, vol. 3, no. 4, pp 227-261, 2000
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
28
-
-
76749092270
-
The WEKA Data Mining Software: An Update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, I. H. Witten, "The WEKA Data Mining Software: An Update", in SIGKDD Explorations, Volume 11, Issue 1,2009
-
(2009)
SIGKDD Explorations
, vol.11
, Issue.1
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
29
-
-
0031276011
-
Bayesian Network Classifiers
-
N. Friedman, D. Geiger, M. Goldszmidt, "Bayesian Network Classifiers", Machine Learning, vol. 29, issue 2, pp 131-163, 1997
-
(1997)
Machine Learning
, vol.29
, Issue.2
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
30
-
-
79952964123
-
-
[Online]. HYPERLINK
-
Nmap. [Online]. HYPERLINK "http://nmap.org/"
-
-
-
|