-
1
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. García-Teodoro, J. Díaz-Verdejo, G. Maciá- Fernández, and E. Vázquez, "Anomaly-based network intrusion detection: techniques, systems and challenges," Computers & Security, vol. 28, no. 1-2, pp. 18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
Maciá- Fernández, G.3
Vázquez, E.4
-
3
-
-
77955469676
-
An overview of ip flow-based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An overview of IP flow-based intrusion detection," IEEE Commun. Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Commun. Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
4
-
-
76649121504
-
Using netflow/ipfix for network management
-
A. Pras, R. Sadre, A. Sperotto, T. Fioreze, D. Hausheer, and J. Schoenwaelder, "Using netflow/IPFIX for network management," J. Network and Systems Management, vol. 17, no. 4, pp. 482-487, 2009.
-
(2009)
J. Network and Systems Management
, vol.17
, Issue.4
, pp. 482-487
-
-
Pras, A.1
Sadre, R.2
Sperotto, A.3
Fioreze, T.4
Hausheer, D.5
Schoenwaelder, J.6
-
7
-
-
77349112206
-
Hidden markov model modeling of ssh brute-force attacks
-
A. Sperotto, R. Sadre, P. de Boer, and A. Pras, "Hidden Markov model modeling of SSH brute-force attacks," in Proc. 2009 IFIP/IEEE Int. Workshop on Distributed Systems: Operations and Management, pp. 164-176.
-
Proc. 2009 IFIP/IEEE Int. Workshop on Distributed Systems: Operations and Management
, pp. 164-176
-
-
Sperotto, A.1
Sadre, R.2
De Boer, P.3
Pras, A.4
-
8
-
-
33646423315
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," Computer Commun., vol. 29, no. 9, pp. 1433-1442, 2006.
-
(2006)
Computer Commun.
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
9
-
-
49549120416
-
An adaptive automatically tuning intrusion detection system
-
Z. Yu, J. J. P. Tsai, and T. Weigert, "An adaptive automatically tuning intrusion detection system," ACM Trans. Auton. Adapt. Syst., vol. 3, pp. 1-25, 2008.
-
(2008)
ACM Trans. Auton. Adapt. Syst.
, vol.3
, pp. 1-25
-
-
Yu, Z.1
Tsai, J.J.P.2
Weigert, T.3
-
11
-
-
77956385147
-
An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm
-
Y. Himura, K. Fukuda, K. Cho, and H. Esaki, "An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm," Int. J. Netw. Manag., vol. 20, pp. 295-316, 2010.
-
Int. J. Netw. Manag
, vol.20
, Issue.2010
, pp. 295-316
-
-
Himura, Y.1
Fukuda, K.2
Cho, K.3
Esaki, H.4
-
12
-
-
0033727064
-
Adaptive/automated detection of service anomalies in transaction-oriented wans: Network analysis, algorithms, implementation, and deployment
-
L. Ho, D. Cavuto, S. Papavassiliou, and A. Zawadzki, "Adaptive/ automated detection of service anomalies in transaction-oriented WANS: network analysis, algorithms, implementation, and deployment," IEEE J. Sel. Areas Commun., vol. 18, no. 5, pp. 744-757, 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.5
, pp. 744-757
-
-
Ho, L.1
Cavuto, D.2
Papavassiliou, S.3
Zawadzki, A.4
-
13
-
-
0032154135
-
Proactive anomaly detection using distributed intelligent agents
-
M. Thottan and C. Ji, "Proactive anomaly detection using distributed intelligent agents," IEEE Network, vol. 12, pp. 21-27, 1998. (Pubitemid 128570724)
-
(1998)
IEEE Network
, vol.12
, Issue.5
, pp. 21-27
-
-
Thottan, M.1
Ji, C.2
-
14
-
-
0043166339
-
Anomaly detection in ip networks
-
-, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, pp. 2191-2204, 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, pp. 2191-2204
-
-
-
15
-
-
26844453653
-
Load characterization, overload prediction, and load anomaly detection for voice over ip traffic
-
M. Mandjes, I. Saniee, and A. Stolyar, "Load characterization, overload prediction, and load anomaly detection for voice over IP traffic," IEEE Trans. Neural Networks, vol. 16, no. 5, pp. 1019-1028, 2005.
-
(2005)
IEEE Trans. Neural Networks
, vol.16
, Issue.5
, pp. 1019-1028
-
-
Mandjes, M.1
Saniee, I.2
Stolyar, A.3
-
18
-
-
77956443147
-
-
Texas A&M University, Technical Report TAMU-CS-TR-2007-1-2
-
S.-Y. Lin, J.-C. Liu, and W. Zhao, "Adaptive CUSUM for anomaly detection and its application to detect shared congestion," Texas A&M University, Technical Report TAMU-CS-TR-2007-1-2, 2007.
-
(2007)
Adaptive CUSUM for Anomaly Detection and its Application to Detect Shared Congestion
-
-
Lin, S.-Y.1
Liu, J.-C.2
Zhao, W.3
-
20
-
-
33747009728
-
Changepoint detection in multichannel and distributed systems with applications
-
A. Tartakovsky and V. Veeravalli, "Changepoint detection in multichannel and distributed systems with applications," Applications of Sequential Methodologies, pp. 331-363, 2004.
-
(2004)
Applications of Sequential Methodologies
, pp. 331-363
-
-
Tartakovsky, A.1
Veeravalli, V.2
-
21
-
-
67449104703
-
Detecting voip calls hidden in web traffic
-
E. Freire, A. Ziviani, and R. Salles, "Detecting VoIP calls hidden in web traffic," IEEE Trans. Network and Service Management, vol. 5, no. 4, pp. 204-214, 2008.
-
(2008)
IEEE Trans. Network and Service Management
, vol.5
, Issue.4
, pp. 204-214
-
-
Freire, E.1
Ziviani, A.2
Salles, R.3
-
22
-
-
67249118576
-
Classification of network traffic via packet-level hidden markov models
-
A. Dainotti, W. de Donato, A. Pescapne, and P. Rossi, "Classification of network traffic via packet-level hidden Markov models," in Proc. 2208 IEEE Global Telecommunications Conference, pp. 1-5.
-
Proc. 2208 IEEE Global Telecommunications Conference
, pp. 1-5
-
-
Dainotti, A.1
De Donato, W.2
Rossi, P.3
-
23
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T. Nguyen and G. Armitage, "A survey of techniques for Internet traffic classification using machine learning," IEEE Commun. Surveys Tutorials, vol. 10, no. 4, pp. 56-76, 2008.
-
(2008)
IEEE Commun. Surveys Tutorials
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.1
Armitage, G.2
-
24
-
-
33244467936
-
Internet traffic classification using bayesian analysis techniques
-
DOI 10.1145/1064212.1064220, SIGMETRICS 2005: International Conference on Measurement and Modeling of Computer Systems - Proceedings
-
A. W. Moore and D. Zuev, "Internet traffic classification using Bayesian analysis techniques," SIGMETRICS Perform. Eval. Rev., vol. 33, pp. 50-60, 2005. (Pubitemid 43275409)
-
(2005)
Performance Evaluation Review
, vol.33
, Issue.1
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
25
-
-
85008065750
-
Machine learning techniques for passive network inventory
-
J. François, H. Abdelnur, R. State, and O. Festor, "Machine learning techniques for passive network inventory," IEEE Trans. Network and Service Management, vol. 7, no. 4, pp. 244-257, 2010.
-
(2010)
IEEE Trans. Network and Service Management
, vol.7
, Issue.4
, pp. 244-257
-
-
François, J.1
Abdelnur, H.2
State, R.3
Festor, O.4
-
27
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains
-
L. E. Baum, T. Petrie, G. Soules, and N. Weiss, "A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains," Annals of Mathematical Statistics, vol. 41, no. 1, pp. 164-171, 1970.
-
(1970)
Annals of Mathematical Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
28
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
30
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH," in Proc. 2001 Conference on USENIX Security Symposium -Volume 10, pp. 25-25.
-
Proc. 2001 Conference on USENIX Security Symposium
, vol.10
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
36
-
-
77049103625
-
A labeled data set for flow-based intrusion detection
-
A. Sperotto, R. Sadre, D. F. van Vliet, and A. Pras, "A labeled data set for flow-based intrusion detection," in Proc. 2009 IEEE Int. Workshop on IP Operations and Management, pp. 39-50.
-
Proc. 2009 IEEE Int. Workshop on IP Operations and Management
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Van Vliet, D.F.3
Pras, A.4
-
38
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," Annales des Telecommunications, vol. 55, no. 7-8, pp. 361-378, 2000.
-
(2000)
Annales des Telecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
39
-
-
33646023117
-
An introduction to roc analysis
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Lett., vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recognition Lett.
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
|