메뉴 건너뛰기




Volumn , Issue , 2013, Pages 8687-8691

Attacking the IDS learning processes

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION; ANOMALY-DETECTION ALGORITHMS; DIFFERENT ATTACKS; INTERNAL STATE; LEARNING PROCESS; NETWORK TRAFFIC; STEGANALYSIS;

EID: 84890540035     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2013.6639362     Document Type: Conference Paper
Times cited : (3)

References (15)
  • 3
    • 84890544641 scopus 로고    scopus 로고
    • Sourcefire, Inc., Accessed in June 2011
    • Sourcefire, Inc., "SNORT-Intrusion Prevention System," http://www.snort.org/, 2011, Accessed in June 2011.
    • (2011) Intrusion Prevention System
  • 9
    • 33748611921 scopus 로고    scopus 로고
    • Esemble based systems in decision making
    • R. Polikar, "Esemble based systems in decision making," IEEE Circuits and Systems Mag., vol. 6, no. 3, pp. 21-45, 2006.
    • (2006) IEEE Circuits and Systems Mag. , vol.6 , Issue.3 , pp. 21-45
    • Polikar, R.1
  • 10
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Philadelphia, PA, August 2005, New York, NY, USA, ACM Press
    • A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies using Traffic Feature Distributions," in ACM SIGCOMM, Philadelphia, PA, August 2005, New York, NY, USA, 2005, pp. 217-228, ACM Press.
    • (2005) ACM SIGCOMM , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 11
    • 33750332606 scopus 로고    scopus 로고
    • Paragraph: Thwarting signature learning by training maliciously
    • Springer
    • J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Recent Advances in Intrusion Detection. 2006, pp. 81-105, Springer.
    • (2006) Recent Advances in Intrusion Detection , pp. 81-105
    • Newsome, J.1    Karp, B.2    Song, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.