-
1
-
-
33646179175
-
Internet intrusions: global characteristics and prevalence
-
San Diego, CA, USA: ACM Press
-
V. Yegneswaran, P. Barford, and Ullrich, "Internet intrusions: global characteristics and prevalence," in Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. San Diego, CA, USA: ACM Press, pp. 138-147, 2003.
-
(2003)
Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, X.3
-
2
-
-
0012127229
-
Intrusion and intrusion detection
-
J. McHugh, "Intrusion and intrusion detection," International Journal of Information Security, vol. 1, no. 1, pp. 14-35, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
3
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
August 22, [Online]
-
A. Patcha and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks (Elsevier Science), vol. 51, no. 12, pp. 3448-3470, August 22, 2007. [Online].Available: http://10.1016/j.comnet.2007.02.001
-
(2007)
Computer Networks (Elsevier Science)
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
4
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Purdue University, West Lafayette, IN, USA, Tech. Rep. CSD-TR-94-013, June 17
-
S. Kumar and E. H. Spafford, "An application of pattern matching in intrusion detection," The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Tech. Rep. CSD-TR-94-013, June 17, 1994.
-
(1994)
The COAST Project, Department of Computer Sciences
-
-
Kumar, S.1
Spafford, E.H.2
-
5
-
-
68049121093
-
Anomaly detection: A survey
-
July, [Online]
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, July 2009. [Online]. Available: http://doi.acm.org/10.1145/1541880.1541882
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
6
-
-
30644460786
-
Intrusion detection in computer networks by multiple classifier systems
-
Los Alamitos, CA USA: IEEE CS
-
G. Giacinto and F. Roli, "Intrusion detection in computer networks by multiple classifier systems," in Proceedings of Int'nl Conference on Pattern Recognition. Los Alamitos, CA, USA: IEEE CS, pp. 390-293, 2002.
-
(2002)
Proceedings of Int'nl Conference on Pattern Recognition
, pp. 390-293
-
-
Giacinto, G.1
Roli, F.2
-
7
-
-
84859494333
-
applying soft computing techniques to intrusion detection
-
Oak Ridge National Laboratory, Oak Ridge, TN
-
L. Delooze and J. Kalita, "applying soft computing techniques to intrusion detection," in Proceedings of Cyber Security and Information Infrastructure Research Workshop, Oak Ridge National Laboratory, Oak Ridge, TN, pp. 70-99, 2006.
-
(2006)
Proceedings of Cyber Security and Information Infrastructure Research Workshop
, pp. 70-99
-
-
Delooze, L.1
Kalita, J.2
-
8
-
-
0038969996
-
Mining needles in a haystack: Classifying rare classes via two-phase rule induction
-
M. V. Joshi, I. T. J. Watson, and R. C. Agarwal, "Mining needles in a haystack: Classifying rare classes via two-phase rule induction," SIGMOD Record (ACM Special Interest Group on Management of Data), Vol. 30, No. 2, pp. 91-102, 2001.
-
(2001)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.30
, Issue.2
, pp. 91-102
-
-
Joshi, M.V.1
Watson, I.T.J.2
Agarwal, R.C.3
-
9
-
-
1642475063
-
Resampling approach for anomaly detection in multispectral images
-
J. Theiler and D. M. Cai, "Resampling approach for anomaly detection in multispectral images," in Proc. SPIE, pp. 230-240, 2003.
-
(2003)
Proc, SPIE
, pp. 230-240
-
-
Theiler, J.1
Cai, D.M.2
-
12
-
-
85077206746
-
The bsd packet filter: A new architecture for user level packet capture
-
USENIX Association, January
-
S. McCanne and V. Jacobson, "The bsd packet filter: A new architecture for user level packet capture," in Proceedings of the Winter 1993 USENIX Conference, USENIX Association, January, pp. 259-269, 1993.
-
(1993)
Proceedings of the Winter 1993 USENIX Conference
, pp. 259-269
-
-
McCanne, S.1
Jacobson, V.2
-
13
-
-
84883271942
-
Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets
-
Security and Trust, October
-
H. G. Kayacik, A. N. Zincir-Heywood, and M. I. Heywood, "Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets," in Proceedings of the Third Annual Conference on Privacy, Security and Trust, October, pp. 1-6, 2005.
-
(2005)
Proceedings of the Third Annual Conference on Privacy
, pp. 1-6
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
14
-
-
84859494337
-
-
Kdd cup 1999 data. October. Online
-
"Kdd cup 1999 data," October 1999. [Online]. Available:http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
(1999)
-
-
-
16
-
-
84859491116
-
-
L. Ertz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, and J. Srivastava, The MINDS- Minnesota Intrusion Detection System, ch. 3, pp.1-21, 2004.
-
(2004)
The MINDS- Minnesota Intrusion Detection System
, vol.3
, pp. 1-21
-
-
Ertz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.-N.4
Kumar, V.5
Srivastava, J.6
-
17
-
-
0035698177
-
Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model
-
Washington, DC, USA: IEEE Computer Society
-
C. Spence, L. Parra, and P. Sajda, "Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model," in Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. Washington, DC, USA: IEEE Computer Society, 2001, p. 3-10.
-
(2001)
Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis
, pp. 3-10
-
-
Spence, C.1
Parra, L.2
Sajda, P.3
-
18
-
-
0030652931
-
Cardwatch: a neural network based database mining system for credit card fraud detection
-
[Online]
-
E. Aleskerov, B. Freisleben, and B. Rao, "Cardwatch: a neural network based database mining system for credit card fraud detection," in Proceedings of the IEEE IAFE 1997 Computational Intelligence for Financial Engineering. IEEE, 1997, pp. 220-226. [Online]. Available: http://10.1109/CIFER.1997.618940
-
(1997)
Proceedings of the IEEE IAFE 1997 Computational Intelligence for Financial Engineering. IEEE
, pp. 220-226
-
-
Aleskerov, E.1
Freisleben, B.2
Rao, B.3
-
19
-
-
32344449062
-
An approach to spacecraft anomaly detection problem using kernel feature space
-
New York, NY, USA: ACM,. Online
-
th ACM SIGKDD international conference on Knowledge discovery in data mining. New York, NY, USA: ACM, 2005, pp. 401-410. [Online]. Available: http://doi.acm.org/10.1145/1081870.1081917
-
(2005)
Proceedings of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining
, pp. 401-410
-
-
Fujimaki, R.1
Yairi, T.2
Machida, K.3
-
20
-
-
70349687675
-
On discordant observations
-
F. Y. Edgeworth, "On discordant observations," Philosophical Magazine, vol. 23, no. 5, pp. 364-375, 1887.
-
(1887)
Philosophical Magazine
, vol.23
, Issue.5
, pp. 364-375
-
-
Edgeworth, F.Y.1
-
21
-
-
33947697162
-
Conditional anomaly detection
-
[Online]
-
X. Song, M. Wu, C. Jermaine, and S. Ranka, "Conditional anomaly detection," IEEE Trans. on Knowl. and Data Eng., vol. 19, no. 5, pp. 631-645, 2007. [Online]. Available: http://dx.doi.org/10.1109/TKDE.2007.1009
-
(2007)
IEEE Trans. on Knowl. and Data Eng.
, vol.19
, Issue.5
, pp. 631-645
-
-
Song, X.1
Wu, M.2
Jermaine, C.3
Ranka, S.4
-
22
-
-
58349122797
-
-
Ph.D. dissertation, The University of New South Wales, November
-
A. Prayote, "Knowledge based anomaly detection," Ph.D. dissertation, The University of New South Wales, November 2007.
-
(2007)
Knowledge based anomaly detection
-
-
Prayote, A.1
-
23
-
-
78651579235
-
-
Master's thesis, Faculty of Computer Science and Media Technology Gjvik University College, Gjvik, Norway
-
R. Storlkken, "Labelling clusters in an anomaly based ids by means of clustering quality indexes," Master's thesis, Faculty of Computer Science and Media Technology Gjvik University College, Gjvik, Norway, 2007.
-
(2007)
Labelling clusters in an anomaly based ids by means of clustering quality indexes
-
-
Storlkken, R.1
-
24
-
-
84941155240
-
Well separated clusters and optimal fuzzy partitions
-
[Online]
-
J. C. Dunn, "Well separated clusters and optimal fuzzy partitions," Journal of Cybernetics, vol. 4, no. 1, pp. 95-104., 1974. [Online]. Available: http://10.1080/01969727408546059
-
(1974)
Journal of Cybernetics
, vol.4
, Issue.1
, pp. 95-104
-
-
Dunn, J.C.1
-
26
-
-
70349266356
-
Comprehensive survey on distance/similarity measures between probability density functions
-
November
-
S. H. Cha, "Comprehensive survey on distance/similarity measures between probability density functions," International Journal of Mathematical Models and Methods in Applied Science, vol. 1, no. 4, pp. 300-307, November, 2007.
-
(2007)
International Journal of Mathematical Models and Methods in Applied Science
, vol.1
, Issue.4
, pp. 300-307
-
-
Cha, S.H.1
-
27
-
-
25144439604
-
-
Fourth Edition, Dorling Kindersley (India) Pvt. Ltd
-
P. N. Tan, M. Steinbach, and V. Kumar, Introduction to Data Mining, Fourth Edition, Dorling Kindersley (India) Pvt. Ltd., 2009.
-
(2009)
Introduction to Data Mining
-
-
Tan, P.N.1
Steinbach, M.2
Kumar, V.3
-
28
-
-
67649946388
-
An incremental-learning method for supervised anomaly detection by cascading service classifier and ITI decision tree methods
-
Berlin, Heidelberg: Springer-Verlag, Online
-
W. Y. Yu and H.-M. Lee, "An incremental-learning method for supervised anomaly detection by cascading service classifier and ITI decision tree methods," in Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 155-160. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-01393-5 17
-
(2009)
Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
, pp. 155-160
-
-
Yu, W.Y.1
Lee, H.-M.2
-
29
-
-
33745777639
-
Incremental support vector learning: Analysis, implementation and applications
-
P. Laskov, C. Gehl, S. Krüger, and K.-R. Müller, "Incremental support vector learning: Analysis, implementation and applications," Journal of Machine Learning Research, vol. 7, pp. 1909-1936, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 1909-1936
-
-
Laskov, P.1
Gehl, C.2
Krüger, S.3
Müller, K.-R.4
-
30
-
-
79951497688
-
Using density-based incremental clustering for anomaly detection
-
Washington, DC, USA: IEEE Computer Society [Online]
-
F. Ren, L. Hu, H. Liang, X. Liu, and W. Ren, "Using density-based incremental clustering for anomaly detection," in Proceedings of the 2008 International Conference on Computer Science and Software Engineering. Washington, DC, USA: IEEE Computer Society, 2008, pp. 986-989. [Online]. Available: http://dx.doi.org/10.1109/CSSE.2008.811
-
(2008)
Proceedings of the 2008 International Conference on Computer Science and Software Engineering
, pp. 986-989
-
-
Ren, F.1
Hu, L.2
Liang, H.3
Liu, X.4
Ren, W.5
-
32
-
-
0030157145
-
BIRCH: an efficient data clustering method for very large databases
-
[Online]
-
T. Zhang, R. Ramakrishnan, and M. Livny, "BIRCH: an efficient data clustering method for very large databases," SIGMOD Rec., vol. 25, no. 2, pp. 103-114, 1996. [Online]. Available: http://doi.acm.org/10.1145/235968.233324
-
(1996)
SIGMOD Rec.
, vol.25
, Issue.2
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
33
-
-
78449264726
-
Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers
-
Springer Berlin Heidelberg, November 23, Online
-
A. Rasoulifard, A. G. Bafghi, and M. Kahani, Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers, in Communications in Computer and Information Science. Springer Berlin Heidelberg, November 23 2008, vol. 6, pp. 577-584. [Online]. Available: http://10.1007/978-3-540-89985-3
-
(2008)
Communications in Computer and Information Science
, vol.6
, pp. 577-584
-
-
Rasoulifard, A.1
Bafghi, A.G.2
Kahani, M.3
-
34
-
-
34249731961
-
Adaptive real-time anomaly detection with incremental clustering
-
[Online]
-
K. Burbeck and S. Nadjm-Tehrani, "Adaptive real-time anomaly detection with incremental clustering," Inf. Secur. Tech. Rep., vol. 12, no. 1, pp. 56-67, 2007. [Online]. Available: http://dx.doi.org/10.1016/j.istr.2007.02.004
-
(2007)
Inf. Secur. Tech. Rep.
, vol.12
, Issue.1
, pp. 56-67
-
-
Burbeck, K.1
Nadjm-Tehrani, S.2
-
35
-
-
63149114320
-
Incremental clustering algorithm for intrusion detection using clonal selection
-
Washington, DC, USA: IEEE Computer Societ [Online]
-
C. Zhong and N. Li, "Incremental clustering algorithm for intrusion detection using clonal selection," in Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Washington, DC, USA: IEEE Computer Society, 2008, pp. 326-331. [Online]. Available: http://dx.doi.org/10.1109/PACIIA.2008.256
-
(2008)
Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application
, pp. 326-331
-
-
Zhong, C.1
Li, N.2
-
36
-
-
44949114202
-
Incremental clustering of mixed data based on distance hierarchy
-
[Online]
-
C. C. Hsu and Y.-P. Huang, "Incremental clustering of mixed data based on distance hierarchy," Expert Syst. Appl., vol. 35, no. 3, pp. 1177-1185, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.eswa.2007.08.049
-
(2008)
Expert Syst. Appl.
, vol.35
, Issue.3
, pp. 1177-1185
-
-
Hsu, C.C.1
Huang, Y.-P.2
-
37
-
-
4544221622
-
A novel clustering method with network structure based on clonal algorithm. in Proceedings of International Conference on Acoustics, Speech, and Signal Processing. Piscataway
-
J. Li, X. Gao, and L. Jiao, "A novel clustering method with network structure based on clonal algorithm," in Proceedings of International Conference on Acoustics, Speech, and Signal Processing. Piscataway, NJ: IEEE Press, 2004, pp. 793-796.
-
(2004)
NJ: IEEE Press
, pp. 793-796
-
-
Li, J.1
Gao, X.2
Jiao, L.3
-
38
-
-
84859497363
-
-
iTL Bulletin, IT Laboratory, NIST, July
-
E. B. Lennon, "Testing intrusion detection systems.", iTL Bulletin, IT Laboratory, NIST, pp. 1-4, July, 2003.
-
(2003)
Testing intrusion detection systems
, pp. 1-4
-
-
Lennon, E.B.1
-
39
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, "Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation," DARPA Information Survivability Conference and Exposition, vol. 2, p. 1012, 2000.
-
(1012)
DARPA Information Survivability Conference and Exposition
, vol.2000
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
42
-
-
84859511357
-
-
Ph.D. dissertation, Computer Science Department, University of Colorado, Colorado Springs
-
L. Delooze, "Applying soft-computing techniques to intrusion detection," Ph.D. dissertation, Computer Science Department, University of Colorado, Colorado Springs, 2005.
-
(2005)
Applying soft-computing techniques to intrusion detection
-
-
Delooze, L.1
-
43
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
April
-
S. Mukkamala, A. H. Sung, and A. Abraham, "Intrusion detection using an ensemble of intelligent paradigms," Journal of Network and Computer Applications, vol. 28, pp. 167-182, April 2005.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
44
-
-
33847256529
-
The devil and packet trace anonymization
-
[Online]
-
R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 29-38, 2006. [Online]. Available: http://doi.acm.org/10.1145/1111322.1111330
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
45
-
-
56549083676
-
A comparative evaluation of anomaly detectors under portscan attacks
-
[Online]
-
th international symposium on Recent Advances in Intrusion Detection, Springer-Verlag, Berlin, Heidelberg, 2008, pp. 351-371. [Online]. Available: http://dx.doi.org/10.1007/978354087403419
-
(2008)
th international symposium on Recent Advances in Intrusion Detection, Springer-Verlag, Berlin, Heidelberg
, pp. 351-371
-
-
Ashfaq, A.B.1
Robert, M.J.2
Mumtaz, A.3
Ali, M.Q.4
Sajjad, A.5
Khayam, S.A.6
-
46
-
-
84859491494
-
Improved detection of low-probable probe and denial-of-service attacks
-
Darmstadt, Germany
-
W. W. Streilein, R. K. Cunningham, and S. E. Webster, "Improved detection of low-probable probe and denial-of-service attacks," in Proceedings of First IEEE International Workshop on Information Assurance, Darmstadt, Germany, 2003, pp. 63-72.
-
(2003)
Proceedings of First IEEE International Workshop on Information Assurance
, pp. 63-72
-
-
Streilein, W.W.1
Cunningham, R.K.2
Webster, S.E.3
-
48
-
-
84859495827
-
-
Online. 1597
-
S. F. Bacon, 1597. [Online]. Available: http://www.quotationspage.com/quote/2060.html
-
-
-
Bacon, S.F.1
-
49
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Transactions on Information and System Security, vol. 3, no. 3, pp. 186-205, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
51
-
-
85019691440
-
Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
52
-
-
80052778744
-
Adaptive ensembles of HMMs applied to anomaly detection
-
July 19, doi:10.1016/j.patcog.2011.06.014
-
W. Khreich, E. Granger, A. Miri, and R. Sabourin. "Adaptive ensembles of HMMs applied to anomaly detection," Pattern Recognition (Elsevier Science), July 19, 2011, doi:10.1016/j.patcog.2011.06.014
-
(2011)
Pattern Recognition (Elsevier Science)
-
-
Khreich, W.1
Granger, E.2
Miri, A.3
Sabourin, R.4
-
55
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
February
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "NADO: Network anomaly detection using outlier approach," in ICCCS'11. ACM, February 2011, pp. 531-536.
-
(2011)
ICCCS'11. ACM
, pp. 531-536
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
56
-
-
79951581599
-
Incremental SVM based on reserved set for network intrusion detection
-
June, USA
-
Y. Yi, J. Wu and W. Xu. "Incremental SVM based on reserved set for network intrusion detection" Journal of Expert Systems with Applications, Vol. 38, No. 6, pp. 7698-7707, June, 2011. USA
-
(2011)
Journal of Expert Systems with Applications
, vol.38
, Issue.6
, pp. 7698-7707
-
-
Yi, Y.1
Wu, J.2
Xu, W.3
|