-
2
-
-
62249168871
-
A hybrid intrusion detection system design for computer network security
-
M. AydIn, A. Zaim, and K. Ceylan A hybrid intrusion detection system design for computer network security Computers and Electrical Engineering 35 3 2009 517 526
-
(2009)
Computers and Electrical Engineering
, vol.35
, Issue.3
, pp. 517-526
-
-
Aydin, M.1
Zaim, A.2
Ceylan, K.3
-
3
-
-
1942489982
-
Hacking techniques the tools that hackers use and how they are evolving to become more sophisticated
-
R. Barber Hacking techniques the tools that hackers use and how they are evolving to become more sophisticated Computer Fraud and Security 2001 3 2001 9 12
-
(2001)
Computer Fraud and Security
, vol.2001
, Issue.3
, pp. 9-12
-
-
Barber, R.1
-
4
-
-
35048886013
-
A robust classifier for passive TCP/IP fingerprinting
-
R. Beverly A robust classifier for passive TCP/IP fingerprinting Passive and Active Network Measurement 2004 158 167
-
(2004)
Passive and Active Network Measurement
, pp. 158-167
-
-
Beverly, R.1
-
7
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
Bhuyan M, Bhattacharyya D, Kalita J. NADO: network anomaly detection using outlier approach. In: Proceedings of the 1st international conference on communication, computing and security. New York, NY, USA: ACM; 2011c. p. 531-6.
-
(2011)
Proceedings of the 1st International Conference on Communication, Computing and Security. New York, NY, USA: ACM
, pp. 531-536
-
-
Bhuyan, M.1
Bhattacharyya, D.2
Kalita, J.3
-
11
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
-
W.-H. Chen, S.-H. Hsu, and H.-P. Shen Application of SVM and ANN for intrusion detection Computer and Operation Research 32 10 2005 2617 2634 (Pubitemid 40219764)
-
(2005)
Computers and Operations Research
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.-H.1
Hsu, S.-H.2
Shen, H.-P.3
-
12
-
-
36348929372
-
Collaborative detection of DDoS attacks over multiple network domains
-
DOI 10.1109/TPDS.2007.1111
-
Y. Chen, K. Hwang, and W.-S. Ku Collaborative detection of DDoS attacks over multiple network domains IEEE Transactions on Parallel Distributed Systems 18 12 2007 1649 1662 (Pubitemid 350142414)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
13
-
-
84867873989
-
Alert-ID: Analyze logs of the network element in real time for intrusion detection
-
Chu J, Ge Z, Huber R, Ji P, Yates J, Yu Y-C. Alert-ID: analyze logs of the network element in real time for intrusion detection. In: Research in attacks, intrusions, and defenses. Springer; 2012. p. 294-313.
-
(2012)
Research in Attacks, Intrusions, and Defenses. Springer
, pp. 294-313
-
-
Chu, J.1
Ge, Z.2
Huber, R.3
Ji, P.4
Yates, J.5
Yu, Y.-C.6
-
15
-
-
84876939080
-
Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues
-
I. Corona, G. Giacinto, and F. Roli Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues Information Sciences 239 2013 201 225
-
(2013)
Information Sciences
, vol.239
, pp. 201-225
-
-
Corona, I.1
Giacinto, G.2
Roli, F.3
-
16
-
-
0142253852
-
ADAM a testbed for exploring the use of data mining in intrusion detection
-
B. Daniel, C. Julia, J. Sushil, and W. Ningning ADAM a testbed for exploring the use of data mining in intrusion detection ACM SIGMOD Record 30 4 2001 15 24
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 15-24
-
-
Daniel, B.1
Julia, C.2
Sushil, J.3
Ningning, W.4
-
18
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 8 1999 805 822
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
19
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 9 1999 805 822
-
(1999)
Computer Networks
, vol.31
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
20
-
-
84952321838
-
Monitoring networks using ntop
-
Deri L, Carbone R, Suin S. Monitoring networks using ntop. In: Proceedings of the 2001 IEEE/IFIP international symposium on integrated network management. Seattle, WA, USA, IEEE; 2001. pp. 199-212.
-
(2001)
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management. Seattle, WA, USA, IEEE
, pp. 199-212
-
-
Deri, L.1
Carbone, R.2
Suin, S.3
-
23
-
-
33745441630
-
MINDS-minnesota intrusion detection system
-
L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, V. Kumar, and J. Srivastava et al. MINDS-minnesota intrusion detection system Next Generation Data Mining 2004 199 218
-
(2004)
Next Generation Data Mining
, pp. 199-218
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Kumar, V.5
Srivastava, J.6
-
24
-
-
57849130705
-
Anomaly-based network intrusion detection techniques, systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Maciá-Fernández, and E. Vázquez Anomaly-based network intrusion detection techniques, systems and challenges Computers and Security 28 1 2009 18 28
-
(2009)
Computers and Security
, vol.28
, Issue.1
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Maciá-Fernández, G.3
Vázquez, E.4
-
25
-
-
79953811849
-
A survey of outlier detection methods in network anomaly identification
-
P. Gogoi, D. Bhattacharyya, B. Borah, and J.K. Kalita A survey of outlier detection methods in network anomaly identification Computer Journal 54 4 2011 570 588
-
(2011)
Computer Journal
, vol.54
, Issue.4
, pp. 570-588
-
-
Gogoi, P.1
Bhattacharyya, D.2
Borah, B.3
Kalita, J.K.4
-
27
-
-
34748870795
-
A framework for an adaptive intrusion detection system using Bayesian network
-
4258675, ISI 2007: 2007 IEEE Intelligence and Security Informatics
-
Jemili F, Zaghdoud M, Ben Ahmed M. A framework for an adaptive intrusion detection system using Bayesian network. In: Proceedings of the IEEE intelligence and security informatics; 2007. p. 66-70. (Pubitemid 47469216)
-
(2007)
ISI 2007: 2007 IEEE Intelligence and Security Informatics
, pp. 66-70
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, M.B.3
-
29
-
-
2442537609
-
NSOM: A tool to detect denial of service attacks using self-organizing maps
-
Labib K, Vemuri R. NSOM: a tool to detect denial of service attacks using self-organizing maps. Technical Report, Department of Applied Science University of California, Davis, California, USA; 2002.
-
(2002)
Technical Report, Department of Applied Science University of California, Davis, California, USA
-
-
Labib, K.1
Vemuri, R.2
-
31
-
-
26844582131
-
Defending against spoofed DDoS attacks with path fingerprint
-
DOI 10.1016/j.cose.2005.03.005, PII S0167404805000465
-
F.-Y. Lee, and S.-P. Shieh Defending against spoofed DDoS attacks with path fingerprint Computers and Security 24 2005 571 586 (Pubitemid 41455416)
-
(2005)
Computers and Security
, vol.24
, Issue.7
, pp. 571-586
-
-
Lee, F.-Y.1
Shieh, S.2
-
32
-
-
84874724334
-
A survey of network flow applications
-
B. Li, J. Springer, G. Bebis, and M. Hadi Gunes A survey of network flow applications Journal of Network and Computer Applications 36 2 2013 567 581
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 567-581
-
-
Li, B.1
Springer, J.2
Bebis, G.3
Hadi Gunes, M.4
-
33
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
R.P. Lippmann, and R.K. Cunningham Improving intrusion detection performance using keyword selection and neural networks Computer Networks 34 4 2000 597 603
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
34
-
-
0027609384
-
A survey of intrusion detection techniques
-
T.F. Lunt A survey of intrusion detection techniques Computers and Security 12 4 1993 405 418
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
35
-
-
79551540583
-
Anonymous serious threat or mere annoyance?
-
S. Mansfield-Devine Anonymous serious threat or mere annoyance? Network Security 2001 1 2011 4 10
-
(2011)
Network Security
, vol.2001
, Issue.1
, pp. 4-10
-
-
Mansfield-Devine, S.1
-
36
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
DOI 10.1109/TDSC.2005.35
-
J. Mirkovic, and P. Reiher D-ward a source-end defense against flooding denial-of-service attacks IEEE Transactions on Dependable Secure Computing 2 3 2005 216 232 (Pubitemid 41560432)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
37
-
-
27544490151
-
NFIDS: A neuro-fuzzy intrusion detection system
-
Mohajerani M, Moeini A, Kianie M. NFIDS: a neuro-fuzzy intrusion detection system. In: Proceedings of the 10th IEEE international conference on electronics, circuits and systems at the University of Sharjah in Sharjah, United Arab Emirates, vol. 1; 2003. p. 348-51.
-
(2003)
Proceedings of the 10th IEEE International Conference on Electronics, Circuits and Systems at the University of Sharjah in Sharjah, United Arab Emirates, Vol. 1
, pp. 348-351
-
-
Mohajerani, M.1
Moeini, A.2
Kianie, M.3
-
38
-
-
84896319768
-
-
SANS Institute InfoSec Reading Room
-
Norton D. An Ettercap primer. SANS Institute InfoSec Reading Room; 2004.
-
(2004)
An Ettercap Primer
-
-
Norton, D.1
-
39
-
-
84892191476
-
Wireshark and Ethereal network protocol analyzer toolkit
-
Orebaugh A, Ramirez G, Beale J. Wireshark and Ethereal network protocol analyzer toolkit. Syngress; 2006.
-
(2006)
Syngress
-
-
Orebaugh, A.1
Ramirez, G.2
Beale, J.3
-
40
-
-
0033295259
-
Bro a system for detecting network intruders in real-time
-
V. Paxson Bro a system for detecting network intruders in real-time Computer Networks 31 23 1999 2435 2463
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
41
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems ACM Computing Surveys (CSUR) 39 1 2007 3
-
(2007)
ACM Computing Surveys (CSUR)
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
42
-
-
78449249325
-
Network forensic frameworks survey and research challenges
-
E.S. Pilli, R. Joshi, and R. Niyogi Network forensic frameworks survey and research challenges Digital Investigation 7 1 2010 14 27
-
(2010)
Digital Investigation
, vol.7
, Issue.1
, pp. 14-27
-
-
Pilli, E.S.1
Joshi, R.2
Niyogi, R.3
-
43
-
-
80955155198
-
Attacks by "anonymous" Wikileaks proponents not anonymous
-
University of Twente, Enschede, The Netherlands; 10 December 2010
-
Pras A, Sperotto A, Moura GCM, Drago I, Barbosa R, Sadre R, et al. Attacks by "anonymous" Wikileaks proponents not anonymous. Technical Report 10.41, Design and Analysis of Communication Systems Group (DACS), University of Twente, Enschede, The Netherlands; 10 December 2010.
-
Technical Report 10.41, Design and Analysis of Communication Systems Group (DACS)
-
-
Pras, A.1
Sperotto, A.2
Gcm, M.3
Drago, I.4
Barbosa, R.5
Sadre, R.6
-
44
-
-
33845591142
-
DDoS-Resilient scheduling to counter application layer attacks under imperfect detection
-
Ranjan S, Swaminathan R, Uysal M, Knightly E. DDoS-Resilient scheduling to counter application layer attacks under imperfect detection. In: Proceedings of the 25th IEEE international conference on computer communications. Barcelona, Spain; 2006. p. 1-13.
-
(2006)
Proceedings of the 25th IEEE International Conference on Computer Communications. Barcelona, Spain
, pp. 1-13
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
48
-
-
79955747674
-
LADS: Large-scale automated DDoS detection system
-
Berkeley, CA, USA: USENIX Association
-
Sekar V, Duffield N, Spatscheck O, van der Merwe J, Zhang H. LADS: large-scale automated DDoS detection system. In: Proceedings of the annual conference on USENIX '06 annual technical conference. Berkeley, CA, USA: USENIX Association; 2006. p. 16.
-
(2006)
Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference
, pp. 16
-
-
Sekar, V.1
Duffield, N.2
Spatscheck, O.3
Van Der Merwe, J.4
Zhang, H.5
-
49
-
-
84896315688
-
An introduction to HTTP fingerprinting
-
S. Shah An introduction to HTTP fingerprinting Net-Square Solutions 2004 1 21
-
(2004)
Net-Square Solutions
, pp. 1-21
-
-
Shah, S.1
-
51
-
-
84991765629
-
Automated worm fingerprinting
-
Berkeley, CA, USA: USENIX Association
-
Singh S, Estan C, Varghese G, Savage S. Automated worm fingerprinting. In: Proceedings of the 6th symposium on operating systems design and implementation, vol. 6. Berkeley, CA, USA: USENIX Association; 2004. p. 4.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
, vol.6
, pp. 4
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
52
-
-
34250167266
-
Flow-based Statistical Aggregation Schemes for Network Anomaly Detection
-
1673246, Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
-
Song S, Ling L, Manikopoulo C. Flow-based statistical aggregation for network anomaly detection. In: Proceedings of the IEEE international conference on networking, sensing and control. Florida, USA: IEEE, Ft. Lauderdale; 2006. p. 786-91. (Pubitemid 46900587)
-
(2006)
Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06
, pp. 786-791
-
-
Sui, S.1
Li, L.2
Manikopoulo, C.N.3
-
53
-
-
33646835092
-
Development of a comprehensive intrusion detection system - Challenges and approaches
-
DOI 10.1007/11593980-27, Information Systems Security - First International Conference, ICISS 2005, Proceedings
-
Subramoniam N, Pawar PS, Bhatnagar M, Khedekar NS, Guntupalli S, Satyanarayana N, et al. Development of a comprehensive intrusion detection system - challenges and approaches. In: Proceedings of the 1st international conference on information systems security. Kolkata, India; 2005. p. 332-5. (Pubitemid 43775420)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 332-335
-
-
Subramanian, N.1
Pawar, P.S.2
Bhatnagar, M.3
Khedekar, N.S.4
Guntupalli, S.5
Satyanarayana, N.6
Vijaykumar, V.K.7
Ampatt, P.K.8
Ranjan, R.9
Pandit, P.J.10
-
54
-
-
84875356217
-
Signature-based multi-layer distributed intrusion detection system using mobile agents
-
M. Uddin, A.A. Rehman, N. Uddin, J. Memon, R. Alsaqour, and S. Kazi Signature-based multi-layer distributed intrusion detection system using mobile agents International Journal of Network Security 15 1 2013 79 87
-
(2013)
International Journal of Network Security
, vol.15
, Issue.1
, pp. 79-87
-
-
Uddin, M.1
Rehman, A.A.2
Uddin, N.3
Memon, J.4
Alsaqour, R.5
Kazi, S.6
-
55
-
-
0002067431
-
Netstat a network-based intrusion detection system
-
G. Vigna, and R.A. Kemmerer Netstat a network-based intrusion detection system Journal of Computer Security 7 1 1999 37 71
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
57
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Y. Xie, and S.Z. Yu Monitoring the application-layer DDoS attacks for popular websites IEEE/ACM Transactions on Networking 17 1 2009 15 25
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.Z.2
-
58
-
-
19544392357
-
Remote OS detection via TCP/IP stack fingerprinting
-
F. Yarochkin Remote OS detection via TCP/IP stack fingerprinting Phrack Magazine 17 3 1998 1 10
-
(1998)
Phrack Magazine
, vol.17
, Issue.3
, pp. 1-10
-
-
Yarochkin, F.1
-
59
-
-
0036575252
-
First-order versus high-order stochastic models for computer intrusion detection
-
DOI 10.1002/qre.478
-
N. Ye, T. Ehiabor, and Y. Zhang First-order versus high-order stochastic models for computer intrusion detection Quality and Reliable Engineering International 18 3 2002 243 250 (Pubitemid 34699726)
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.3
, pp. 243-250
-
-
Ye, N.1
Ehiabor, T.2
Zhang, Y.3
-
61
-
-
47149094655
-
A detection and offense mechanism to defend against application layer DDoS attacks
-
IEEE, National University of Defense Technology, Changsha
-
Yu J, Li Z, Chen H, Chen X. A detection and offense mechanism to defend against application layer DDoS attacks. In: Proceedings of the 3rd international conference on networking and services. IEEE, National University of Defense Technology, Changsha, 2007. p. 54-60.
-
(2007)
Proceedings of the 3rd International Conference on Networking and Services
, pp. 54-60
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
62
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
West Point, NY, USA: IEEE Computer Society
-
Zhang Z, Li J, Manikopoulos C, Jorgenson J, Ucles J. HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In: Proceedings of the 2nd annual IEEE systems, cybernetics information assurance workshop. West Point, NY, USA: IEEE Computer Society; 2001. p. 85-90.
-
(2001)
Proceedings of the 2nd Annual IEEE Systems, Cybernetics Information Assurance Workshop
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.3
Jorgenson, J.4
Ucles, J.5
-
63
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C.V. Zhou, C. Leckie, and S. Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computers and Security 29 1 2010 124 140
-
(2010)
Computers and Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|