-
3
-
-
78650397952
-
Preliminary results on masquerader detection using compression-based similarity metrics
-
M. Bertacchini, and P.I. Fierens Preliminary results on masquerader detection using compression-based similarity metrics Electron J SADIO 7 1 2007
-
(2007)
Electron J SADIO
, vol.7
, Issue.1
-
-
Bertacchini, M.1
Fierens, P.I.2
-
4
-
-
58349121261
-
Adversarial pattern classification using multiple classifiers and randomisation. Structutal, syntactic, and statistical pattern recognition
-
B. Biggio, G. Fumera, and F. Roli Adversarial pattern classification using multiple classifiers and randomisation. Structutal, syntactic, and statistical pattern recognition LNCS 5342 2008 500 509
-
(2008)
LNCS
, vol.5342
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
5
-
-
75149143441
-
Designing host and network sensors to mitigate the insider threat
-
B.M. Bowen, M. Ben Salem, S. Hershkop, A.D. Keromytis, and S.J. Stolfo Designing host and network sensors to mitigate the insider threat IEEE Security & Privacy Nov/Dec 2009 22 29
-
(2009)
IEEE Security & Privacy
, pp. 22-29
-
-
Bowen, B.M.1
Ben Salem, M.2
Hershkop, S.3
Keromytis, A.D.4
Stolfo, S.J.5
-
7
-
-
78650005480
-
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
-
Chan-Tin E, Feldman D, Hopper N, and Kim Y, The frog-boiling attack: limitations of anomaly detection for secure network coordinate systems. In: Secure Comm; 2009.
-
(2009)
Secure Comm
-
-
Chan-Tin, E.1
Feldman, D.2
Hopper, N.3
Kim, Y.4
-
8
-
-
35348917347
-
Masquerader detection using OCLEP: One-class classification using Legth statistics of emerging patterns
-
Chen L and Dong G, Masquerader detection using OCLEP: one-class classification using Legth statistics of emerging patterns. In: WAIMW; 2006. p. 5.
-
(2006)
WAIMW
, pp. 5
-
-
Chen, L.1
Dong, G.2
-
9
-
-
84877746914
-
Adversarial classification
-
Delvi N, Domingos P, Mausam S, Sanghai S and Verma D, Adversarial classification. In: ACM KDD; 2004. pp. 98-108.
-
(2004)
ACM KDD
, pp. 98-108
-
-
Delvi, N.1
Domingos, P.2
Mausam, S.3
Sanghai, S.4
Verma, D.5
-
10
-
-
75149188648
-
Building a system for insider security
-
F.A. Durán, S.H. Conrad, G.N. Conrad, D.P. Duggan, and E.B. Held Building a system for insider security IEEE Security & Privacy Nov/Dec 2009 30 38
-
(2009)
IEEE Security & Privacy
, pp. 30-38
-
-
Durán, F.A.1
Conrad, S.H.2
Conrad, G.N.3
Duggan, D.P.4
Held, E.B.5
-
11
-
-
0002248845
-
An overview of the relationships between mimicry and crypsis
-
J.A. Endler An overview of the relationships between mimicry and crypsis Biol J Linnean Soc 16 1 1981 25 31
-
(1981)
Biol J Linnean Soc
, vol.16
, Issue.1
, pp. 25-31
-
-
Endler, J.A.1
-
12
-
-
84942247408
-
Stochastic protocol modeling for anomaly-based network intrusion detection
-
Estevez-Tapiador JM, Garcia-Teodoro P and Diaz-Verdejo JE, Stochastic protocol modeling for anomaly-based network intrusion detection. In: IWIA; 2003. pp. 3-12.
-
(2003)
IWIA
, pp. 3-12
-
-
Estevez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
14
-
-
47949129926
-
MDL compress for intrusion detection: Signature Inference and masquerade attack
-
Evans S, Eiland E, Markham S, Impson J, and Laczo A, MDL compress for intrusion detection: signature Inference and masquerade attack. In: MILCOM; 2007. pp. 1-7.
-
(2007)
MILCOM
, pp. 1-7
-
-
Evans, S.1
Eiland, E.2
Markham, S.3
Impson, J.4
Laczo, A.5
-
15
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Fogla P and Lee W, Evading network anomaly detection systems: formal reasoning and practical techniques. In: CCS; 2006. pp. 59-68. (Pubitemid 47131356)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
16
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla P, Sharif M, Perdisci R, Kolesnikov O, and Lee W, Polymorphic blending attacks. In: 15th USENIX Security Symposium; 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
20
-
-
26844533423
-
Intrusion detection via analysis and modelling of user commands
-
Data Warehousing and Knowledge Discovery: 7th International Conference, DaWaK 2005. Proceedings
-
M. Gebski, and R.K. Wong Intrusion detection via analysis and modelling of user commands DAWAK, LNCS Vol. 3589 2005 Springer-Verlag 388 397 (Pubitemid 41450419)
-
(2005)
Lecture Notes in Computer Science
, vol.3589
, pp. 388-397
-
-
Gebski, M.1
Wong, R.K.2
-
23
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J Comput Security 6 1998 151 180
-
(1998)
J Comput Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
27
-
-
48649108270
-
Toward realistic and artifact-free insider-threat data
-
Killourhy KS and Maxion RA, Toward realistic and artifact-free insider-threat data. In: ACSAC; 2007. pp. 87-96.
-
(2007)
ACSAC
, pp. 87-96
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
29
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Kruegel C, Kirda E, Mutz D, Robertson W, and Vigna G, Automating mimicry attacks using static binary analysis. In: USENIX Security Symposium; 2005.
-
(2005)
USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
30
-
-
26444586639
-
Masquerade detection via customized grammars
-
Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
-
M. Latendresse Masquerade detection via customized grammars DIMVA 2005, LNCS Vol. 3548 2005 Springer-Verlag 141 159 (Pubitemid 41430271)
-
(2005)
Lecture Notes in Computer Science
, vol.3548
, pp. 141-159
-
-
Latendresse, M.1
-
31
-
-
79960841791
-
Adversarial learning
-
Lowd D and Meek C, Adversarial learning. In: ACM KDD; 2005.
-
(2005)
ACM KDD
-
-
Lowd, D.1
Meek, C.2
-
32
-
-
0242456801
-
Learning nonstationary models of normal network traffic for etecting novel attacks
-
Mahoney M and Chan PK, Learning nonstationary models of normal network traffic for etecting novel attacks. In: Proc. SIGKDD; 2002.
-
(2002)
Proc. SIGKDD
-
-
Mahoney, M.1
Chan, P.K.2
-
33
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Mahoney M, Network traffic anomaly detection based on packet bytes. In: Proc. ACM SAC; 2003.
-
(2003)
Proc. ACM SAC
-
-
Mahoney, M.1
-
34
-
-
0036931591
-
Masquerade detection using truncated command lines
-
Maxion RA and Townsend TN, Masquerade detection using truncated command lines. In: DSN; 2002. pp. 219-228.
-
(2002)
DSN
, pp. 219-228
-
-
Maxion, R.A.1
Townsend, T.N.2
-
35
-
-
1542378274
-
Masquerade detection using enriched command Lines
-
Maxion RA, Masquerade detection using enriched command Lines. In: DSN; 2003. pp. 5-14.
-
(2003)
DSN
, pp. 5-14
-
-
Maxion, R.A.1
-
36
-
-
35048851006
-
Anomaly detection using layered networks based on eigen co-occurrence matrix
-
M. Oka, Y. Oyama, H. Abe, and K. Kato Anomaly detection using layered networks based on Eigen co-occurrence matrix RAID 2004, LNCS Vol. 3224 2004 Springer-Verlag 223 237 (Pubitemid 39741896)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 223-237
-
-
Oka, M.1
Oyama, Y.2
Abe, H.3
Kato, K.4
-
38
-
-
33845941202
-
Hybrid method for detecting masqueraders using session folding and hidden Markov models
-
MICAI 2006: Advances in Artificial Intelligence - 5th Mexican International Conference on Artificial Intelligence, Proceedings
-
Posadas R, Mex-Perera JC, Monroy R, Nolazco-Flores JA, Hybrid method for detecting masqueraders using session folding and hidden Markov models. In: Proc. 5th Mexican Intl. Conf. on Artificial Intelligence; 2006. pp. 622-631. (Pubitemid 46030660)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4293 LNAI
, pp. 622-631
-
-
Posadas, R.1
Mex-Perera, C.2
Monroy, R.3
Nolazco-Flores, J.4
-
39
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
DOI 10.1214/ss/998929476
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A.F. Karr, M. Theus, and Y. Vardi Computer intrusion: detecting masquerades Stat Sci 16 1 Feb 2001 58 74 (Pubitemid 33632847)
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
40
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Sommer R and Paxson V, Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy; 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Sommer, R.1
Paxson, V.2
-
42
-
-
0012781111
-
Undermining an anomaly-based intrusion detection systems using common exploits
-
Tan KMC, Killourhy KS and Maxion RA, Undermining an anomaly-based intrusion detection systems using common exploits. In: RAID;2002.
-
(2002)
RAID
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
43
-
-
79960836143
-
Information-theoretic detection of mimicry masquerade attacks
-
Tapiador JE and Clark JA, Information-theoretic detection of mimicry masquerade attacks. In: NSS; 2010. pp. 5-13.
-
(2010)
NSS
, pp. 5-13
-
-
Tapiador, J.E.1
Clark, J.A.2
-
45
-
-
0038011184
-
Mimicry attacks on host-based Intrusion detection systems
-
Wagner D and Soto P, Mimicry attacks on host-based Intrusion detection systems. In: ACM CCS; 2002.
-
(2002)
ACM CCS
-
-
Wagner, D.1
Soto, P.2
-
47
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
Wang K and Stolfo S, Anomalous payload-based network intrusion detection. In: RAID; 2004.
-
(2004)
RAID
-
-
Wang, K.1
Stolfo, S.2
-
48
-
-
33750351545
-
Anomalous payload-based worm detection and signature generation
-
Wang K and Stolfo S, Anomalous payload-based worm detection and signature generation. In: RAID; 2005.
-
(2005)
RAID
-
-
Wang, K.1
Stolfo, S.2
-
50
-
-
48649098207
-
Combating good word attacks on statistical spam filters with multiple instance learning
-
Y. Zhou, Z. Jorgensen, and M. Inge Combating good word attacks on statistical spam filters with multiple instance learning IEEE ICTAI 2007 298 305
-
(2007)
IEEE ICTAI
, pp. 298-305
-
-
Zhou, Y.1
Jorgensen, Z.2
Inge, M.3
|