-
1
-
-
84859965169
-
-
PhD thesis, Carnegie Mellon University, Pittsburgh, PA, USA
-
B.A. AsSadhan. Network Traffic Analysis Through Statistical Signal Processing Methods, PhD thesis, Carnegie Mellon University, Pittsburgh, PA, USA, 2009
-
(2009)
Network Traffic Analysis Through Statistical Signal Processing Methods.
-
-
AsSadhan, B.A.1
-
2
-
-
43249105264
-
-
Technical Report CSE-2007-1, University of California, Davis, Department of Computer Science, Davis, CA
-
S.T. Brugger and J. Chow. An assessment of the DARPA IDS Evaluation Dataset using Snort, Technical Report CSE-2007-1, University of California, Davis, Department of Computer Science, Davis, CA, 2007
-
(2007)
An Assessment of the DARPA IDS Evaluation Dataset Using Snort.
-
-
Brugger, S.T.1
Chow, J.2
-
3
-
-
84859995824
-
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS
-
UK
-
W.B. Buchanan., F. Flandrin., R. Macfarlane and J.A. Graves. "A Methodology to Evaluate Rate-Based Intrusion Prevention System against Distributed Denial-of-Service (DDoS)", In Cyberforensics 2011, UK
-
(2011)
Cyberforensics.
-
-
Buchanan, W.B.1
Flandrin, F.2
Macfarlane, R.3
Graves, J.A.4
-
4
-
-
84860009491
-
-
CTFC (Capture the flag contest) defcon datasets, Accessed 09 January 2011
-
CTFC (Capture the flag contest) defcon datasets, http://cctf.shmoo.com/ data/, Accessed 09 January 2011.
-
-
-
-
5
-
-
84859995826
-
-
CAIDA datasets, Accessed 13 March 2011
-
CAIDA datasets http://www.caida.org/data/statistics/all-data.xml, Accessed 13 March 2011
-
-
-
-
6
-
-
84859995827
-
-
DARPA Intrusion Detection Scenario Specific Datasets, Accessed 20 April 2011
-
DARPA Intrusion Detection Scenario Specific Datasets http://www.ll.mit. edu/mission/communications/ist/corpora/ideval/d ata/index.html, Accessed 20 April 2011
-
-
-
-
7
-
-
79960352377
-
-
Springer, New York, LLCC
-
A.A. Ghorbani, W. Lu and M. Tavallaee. Network Intrusion Detection and Prevention: Concepts and Techniques, Springer, New York, LLCC, 2010
-
(2010)
Network Intrusion Detection and Prevention: Concepts and Techniques.
-
-
Ghorbani, A.A.1
Lu, W.2
Tavallaee, M.3
-
9
-
-
84859964876
-
-
10 Moulton Street, Cambridge, MA 01845, USA
-
A. W. Jackson, D. Lapsley, C. Jones, M. Zatko, C. Golubitsky, and W.T. Straye. SLINGbot: A System for Live Investigation of Next Generation Botnets, BBN Technologies, 10 Moulton Street, Cambridge, MA 01845, USA, 2009
-
(2009)
SLINGbot: A System for Live Investigation of Next Generation Botnets, BBN Technologies.
-
-
Jackson, A.W.1
Lapsley, D.2
Jones, C.3
Zatko, M.4
Golubitsky, C.5
Straye, W.T.6
-
10
-
-
84859964883
-
-
KDD-98 datasets, Accessed 20 April 2011
-
KDD-98 datasets http://kdd.ics.uci.edu/databases/kddcup98/kddcup98.html, Accessed 20 April 2011
-
-
-
-
11
-
-
84859964881
-
-
KDD, 1999 datasets, Accessed 20 April 2011
-
KDD 1999 datasets http://www.sigkdd.org/kddcup/index.php?section= 1999&method=data, Accessed 20 April 2011
-
-
-
-
12
-
-
84859994442
-
-
NSL-dataset, Accessed 20 April 2011
-
NSL-dataset http://iscx.ca/NSL-KDD/, Accessed 20 April 2011
-
-
-
-
13
-
-
84859994441
-
-
LBNL/ICSI, Accessed 20 April 2011
-
LBNL/ICSI http://www.icir.org/enterprise-tracing/, Accessed 20 April 2011
-
-
-
-
14
-
-
79957969805
-
Feature reduction using principal component analysis for effective anomaly-based intrusion detection on NSL-KDD
-
S. Lakhina, S. Joseph and B. Verma. "Feature Reduction using Principal Component Analysis for Effective Anomaly-Based Intrusion Detection on NSL-KDD", International Journal of Engineering Science and Technology, Vol. 2, pp. 1790-1799, 2010
-
(2010)
International Journal of Engineering Science and Technology
, vol.2
, pp. 1790-1799
-
-
Lakhina, S.1
Joseph, S.2
Verma, B.3
-
15
-
-
85019691440
-
Testing intrusion detection systems: A Critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh. "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and System Security, Vol. 3, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
20
-
-
84860009496
-
-
SLINGbot, Accessed 20 April 2011
-
SLINGbot http://www.botnetworks.com/, Accessed 20 April 2011
-
-
-
-
21
-
-
0032665796
-
Evaluating data mining procedures: Techniques for generating artificial data sets
-
P.D. Scott and E. Wilkins. Evaluating data mining procedures: Techniques for generating artificial data sets, Information and Software Technology, Vol. 41, pp. 579-587, 1999
-
(1999)
Information and Software Technology
, vol.41
, pp. 579-587
-
-
Scott, P.D.1
Wilkins, E.2
-
22
-
-
84858055445
-
-
Indian Institute of Science, Bangalore, India, February
-
C. Thomas, V. Sharma and N. Balakrishnan. Usefulness of DARPA Dataset for Intrusion Detection System Evaluation, Indian Institute of Science, Bangalore, India, February, 2010
-
(2010)
Usefulness of DARPA Dataset for Intrusion Detection System Evaluation.
-
-
Thomas, C.1
Sharma, V.2
Balakrishnan, N.3
-
23
-
-
84860009495
-
-
Umass. Network traces, Accessed 20 April 2011
-
Umass. Network traces http://traces.cs.umass.edu//, Accessed 20 April 2011
-
-
-
|