-
1
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, vol. 31, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
2
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garca-Teodoro, J. Daz-Verdejo, G. Maci-Fernndez, and E. Vzquez, Anomaly-Based Network Intrusion Detection: Techniques, Systems and Challenges, Computers and Security, vol. 28, pp. 18-28, 2009.
-
(2009)
Computers and Security
, vol.28
, pp. 18-28
-
-
Garca-Teodoro, P.1
Daz-Verdejo, J.2
Maci-Fernndez, G.3
Vzquez, E.4
-
3
-
-
0023294428
-
An intrusion-detection model
-
Feb
-
D.E. Denning, An Intrusion-Detection Model, IEEE Trans. Software Eng., vol. TSE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.TSE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
4
-
-
37349125374
-
DDoS attack detection method using cluster analysis
-
DOI 10.1016/j.eswa.2007.01.040, PII S0957417407000395
-
K. Lee, J. Kim, K.H. Kwon, Y. Han, and S. Kim, DDoS Attack Detection Method Using Cluster Analysis, Expert Systems with Applications, vol. 34, no. 3, pp. 1659-1665, 2008. (Pubitemid 350298194)
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.3
, pp. 1659-1665
-
-
Lee, K.1
Kim, J.2
Kwon, K.H.3
Han, Y.4
Kim, S.5
-
5
-
-
58549089680
-
Intrusion detection using fuzzy association rules
-
A. Tajbakhsh, M. Rahmati, and A. Mirzaei, Intrusion Detection Using Fuzzy Association Rules, Applied Soft Computing, vol. 9, no. 2, pp. 462-469, 2009.
-
(2009)
Applied Soft Computing
, vol.9
, Issue.2
, pp. 462-469
-
-
Tajbakhsh, A.1
Rahmati, M.2
Mirzaei, A.3
-
6
-
-
84954358597
-
Traffic flooding attack detection with snmp mib using svm
-
J. Yu, H. Lee, M.-S. Kim, and D. Park, Traffic Flooding Attack Detection with SNMP MIB Using SVM, Computer Comm., vol. 31, no. 17, pp. 4212-4219, 2008.
-
(2008)
Computer Comm.
, vol.31
, Issue.17
, pp. 4212-4219
-
-
Yu, J.1
Lee, H.2
Kim, M.-S.3
Park, D.4
-
7
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
DOI 10.1109/TSMCB.2007.914695
-
W. Hu, W. Hu, and S. Maybank, AdaBoost-Based Algorithm for Network Intrusion Detection, IEEE Trans. Systems, Man, and Cybernetics Part B, vol. 38, no. 2, pp. 577-583, Apr. 2008. (Pubitemid 351484757)
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
8
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
Dec
-
C. Yu, H. Kai, and K. Wei-Shinn, Collaborative Detection of DDoS Attacks over Multiple Network Domains, IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1649-1662, Dec. 2007.
-
(2007)
IEEE Trans. Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Yu, C.1
Kai, H.2
Wei-Shinn, K.3
-
9
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
Ar
-
G. Thatte, U. Mitra, and J. Heidemann, Parametric Methods for Anomaly Detection in Aggregate Traffic, IEEE/ACM Trans. Networking, vol. 19, no. 2, pp. 512-525, Apr. 2011.
-
(2011)
IEEE/ACM Trans. Networking
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
10
-
-
17444432965
-
Hierarchical Kohonenen Net for anomaly detection in network security
-
DOI 10.1109/TSMCB.2005.843274
-
S.T. Sarasamma, Q.A. Zhu, and J. Huff, Hierarchical Kohonenen Net for Anomaly Detection in Network Security, IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 35, no. 2, pp. 302-312, Apr. 2005. (Pubitemid 40535913)
-
(2005)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
11
-
-
84860543902
-
Discriminating ddos attacks from flash crowds using flow correlation coefficient
-
June
-
S. Yu, W. Zhou, W. Jia, S. Guo, Y. Xiang, and F. Tang, Discriminating DDoS Attacks from Flash Crowds Using Flow Correlation Coefficient, IEEE Trans. Parallel and Distributed Systems, vol. 23, no. 6, pp. 1073-1080, June 2012.
-
(2012)
IEEE Trans. Parallel and Distributed Systems
, vol.23
, Issue.6
, pp. 1073-1080
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Guo, S.4
Xiang, Y.5
Tang, F.6
-
12
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
DOI 10.1016/j.patcog.2006.12.010, PII S0031320306005310
-
S. Jin, D.S. Yeung, and X. Wang, Network Intrusion Detection in Covariance Feature Space, Pattern Recognition, vol. 40, pp. 2185-2197, 2007. (Pubitemid 46574766)
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2185-2197
-
-
Jin, S.1
Yeung, D.S.2
Wang, X.3
-
13
-
-
68949161842
-
A triangle area based nearest neighbors approach to intrusion detection
-
C.F. Tsai and C.Y. Lin, A Triangle Area Based Nearest Neighbors Approach to Intrusion Detection, Pattern Recognition, vol. 43, pp. 222-229, 2010.
-
(2010)
Pattern Recognition
, vol.43
, pp. 222-229
-
-
Tsai, C.F.1
Lin, C.Y.2
-
14
-
-
84875222968
-
Repids: A multi tier real-time payload-based intrusion detection system
-
A. Jamdagni, Z. Tan, X. He, P. Nanda, and R.P. Liu, RePIDS: A Multi Tier Real-Time Payload-Based Intrusion Detection System, Computer Networks, vol. 57, pp. 811-824, 2013.
-
(2013)
Computer Networks
, vol.57
, pp. 811-824
-
-
Jamdagni, A.1
Tan, Z.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
15
-
-
81855220824
-
Denial-of-service attack detection based on multivariate correlation analysis
-
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis, Proc. Conf. Neural Information Processing, pp. 756-765, 2011.
-
(2011)
Proc. Conf. Neural Information Processing
, pp. 756-765
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
16
-
-
84868097806
-
Triangle-area-based multivariate correlation analysis for effective denialof-service attack detection
-
Z. Tan, A. Jamdagni, X. He, P. Nanda, and R.P. Liu, Triangle-Area-Based Multivariate Correlation Analysis for Effective Denialof-Service Attack Detection, Proc. IEEE 11th Int'l Conf. Trust, Security and Privacy in Computing and Comm., pp. 33-40, 2012.
-
(2012)
Proc. IEEE 11th Int'l Conf. Trust, Security and Privacy in Computing and Comm.
, pp. 33-40
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
-
17
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
S.J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P.K. Chan, Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project, Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '00), vol. 2, pp. 130-144, 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '00)
, vol.2
, pp. 130-144
-
-
Stolfo, S.J.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
18
-
-
0032163280
-
Quickest detection of abrupt changes for a class of random processes
-
PII S0018944898051244
-
G.V. Moustakides, Quickest Detection of Abrupt Changes for a Class of random Processes, IEEE Trans. Information Theory, vol. 44, no. 5, pp. 1965-1968, Sept. 1998. (Pubitemid 128738566)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1965-1968
-
-
Moustakides, G.V.1
-
19
-
-
8744295684
-
Distributed change detection for worms, ddos and other network attacks
-
A.A. Cardenas, J.S. Baras, and V. Ramezani, Distributed Change Detection for Worms, DDoS and Other Network Attacks, Proc. The Am. Control Conf., vol. 2, pp. 1008-1013, 2004.
-
(2004)
Proc the Am. Control Conf.
, vol.2
, pp. 1008-1013
-
-
Cardenas, A.A.1
Baras, J.S.2
Ramezani, V.3
-
20
-
-
77949788147
-
Attribute normalization in network intrusion detection
-
W. Wang, X. Zhang, S. Gombault, and S.J. Knapskog, Attribute Normalization in Network Intrusion Detection, Proc. 10th Int'l Symp. Pervasive Systems, Algorithms, and Networks (ISPAN), pp. 448-453, 2009.
-
(2009)
Proc. 10th Int'l Symp. Pervasive Systems, Algorithms, and Networks (ISPAN)
, pp. 448-453
-
-
Wang, W.1
Zhang, X.2
Gombault, S.3
Knapskog, S.J.4
-
21
-
-
77950575061
-
A detailed analysis of the kdd cup 99 data set
-
M. Tavallaee, E. Bagheri, L. Wei, and A.A. Ghorbani, A Detailed Analysis of the KDD Cup 99 Data Set, Proc. IEEE Second Int'l Conf. Computational Intelligence for Security and Defense Applications, pp. 1-6, 2009.
-
(2009)
Proc. IEEE Second Int'l Conf. Computational Intelligence for Security and Defense Applications
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Wei, L.3
Ghorbani, A.A.4
|