-
1
-
-
79955482186
-
HMMPayl an intrusion detection system based on hidden Markov models
-
D. Ariu, R. Tronci, and G. Giacinto HMMPayl an intrusion detection system based on hidden Markov models Comput Secur 30 2011 221 241
-
(2011)
Comput Secur
, vol.30
, pp. 221-241
-
-
Ariu, D.1
Tronci, R.2
Giacinto, G.3
-
3
-
-
33845989821
-
Can machine learning be secure?
-
DOI 10.1145/1128817.1128824, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
Barreno M, Nelson B, Sears R, Joseph AD, Tygar J. Can machine learning be secure? In: Proceedings of the 2006 ACM symposium on information, computer and communications security, ACM; 2006. p. 16-25. (Pubitemid 46644722)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
5
-
-
79952315022
-
Multiple classifier systems for robust classifier design in adversarial environments
-
B. Biggio, G. Fumera, and F. Roli Multiple classifier systems for robust classifier design in adversarial environments Int J Mach Learn Cybern 1 2010 27 41
-
(2010)
Int J Mach Learn Cybern
, vol.1
, pp. 27-41
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B.H. Bloom Space/time trade-offs in hash coding with allowable errors Commun ACM 13 1970 422 426
-
(1970)
Commun ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
8
-
-
18844454571
-
Remote timing attacks are practical
-
DOI 10.1016/j.comnet.2005.01.010, PII S1389128605000125, Web Traffic
-
D. Brumley, and D. Boneh Remote timing attacks are practical Comput Netw 48 2005 701 716 (Pubitemid 40684158)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
10
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
Chen S, Wang R, Wang X, Zhang K. Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE symposium on security and privacy (SP), IEEE; 2010. p. 191-206.
-
(2010)
2010 IEEE Symposium on Security and Privacy (SP), IEEE
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
12
-
-
84876939080
-
Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues
-
I. Corona, G. Giacinto, and F. Roli Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues Inf Sci 239 2013 201 225
-
(2013)
Inf Sci
, vol.239
, pp. 201-225
-
-
Corona, I.1
Giacinto, G.2
Roli, F.3
-
13
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
Fogla P, Lee W. Evading network anomaly detection systems: formal reasoning and practical techniques. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, Alexandria, VA, USA; 2006. p. 59-68. (Pubitemid 47131356)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 59-68
-
-
Fogla, P.1
Lee, W.2
-
14
-
-
85077703150
-
Polymorphic blending attacks
-
USENIX, Vancouver, BC, Canada
-
Fogla P, Sharif M, Perdisci R, Kolesnikov O, Lee W. Polymorphic blending attacks. In: Proceedings of the 15th USENIX security symposium, USENIX, Vancouver, BC, Canada; 2006. p. 241-56.
-
(2006)
Proceedings of the 15th USENIX Security Symposium
, pp. 241-256
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
15
-
-
84867893847
-
N-gram against the machine: On the feasibility of the n-gram network analysis for binary protocols
-
Springer
-
Hadziosmanovic D, Simionato L, Bolzoni D, Zambon E, Etalle S. N-gram against the machine: on the feasibility of the n-gram network analysis for binary protocols. In: Recent advances in intrusion detection. Lecture notes in computer science, vol. 7462. Springer; 2012. p. 354-73.
-
(2012)
Recent Advances in Intrusion Detection. Lecture Notes in Computer Science
, vol.7462
, pp. 354-373
-
-
Hadziosmanovic, D.1
Simionato, L.2
Bolzoni, D.3
Zambon, E.4
Etalle, S.5
-
16
-
-
84868252396
-
Machine learning based network traffic classification a survey
-
B. Hu, and Y. Shen Machine learning based network traffic classification a survey J Inf Comput Sci 9 2012 3161 3170
-
(2012)
J Inf Comput Sci
, vol.9
, pp. 3161-3170
-
-
Hu, B.1
Shen, Y.2
-
17
-
-
80955143573
-
Adversarial machine learning
-
ACM, New York, NY, USA
-
Huang L, Joseph AD, Nelson B, Rubinstein BI, Tygar JD. Adversarial machine learning. In: Proceedings of the 4th ACM workshop on security and artificial intelligence, AISec '11, ACM, New York, NY, USA; 2011. p. 43-58.
-
(2011)
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, AISec '11
, pp. 43-58
-
-
Huang, L.1
Joseph, A.D.2
Nelson, B.3
Rubinstein, B.I.4
Tygar, J.D.5
-
18
-
-
84862299994
-
Online anomaly detection under adversarial impact
-
M. Kloft, and P. Laskov Online anomaly detection under adversarial impact J Mach Learn Res - Proc Track 9 2010 405 412
-
(2010)
J Mach Learn Res - Proc Track
, vol.9
, pp. 405-412
-
-
Kloft, M.1
Laskov, P.2
-
19
-
-
31844441673
-
Advanced polymorphic worms: Evading IDS by blending in with normal traffic
-
Georgia Institute of Technology
-
Kolesnikov O, Lee W. Advanced polymorphic worms: evading IDS by blending in with normal traffic. Technical Report, Georgia Institute of Technology; 2005.
-
(2005)
Technical Report
-
-
Kolesnikov, O.1
Lee, W.2
-
20
-
-
78650169163
-
The use of artificial intelligence based techniques for intrusion detection a review
-
G. Kumar, K. Kumar, and M. Sachdeva The use of artificial intelligence based techniques for intrusion detection a review Artif Intell Rev 34 2010 369 387
-
(2010)
Artif Intell Rev
, vol.34
, pp. 369-387
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
21
-
-
80052025073
-
Self-adaptive and dynamic clustering for online anomaly detection
-
S. Lee, G. Kim, and S. Kim Self-adaptive and dynamic clustering for online anomaly detection Expert Syst Appl 38 2011 14891 14898
-
(2011)
Expert Syst Appl
, vol.38
, pp. 14891-14898
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
24
-
-
77955040866
-
Kids: Keyed intrusion detection system
-
Springer-Verlag, Berlin, Heidelberg
-
Mrdovic S, Drazenovic B. Kids: keyed intrusion detection system. In: Proceedings of the 7th international conference on detection of intrusions and malware, and vulnerability assessment, DIMVA'10, Springer-Verlag, Berlin, Heidelberg; 2010. p. 173-82.
-
(2010)
Proceedings of the 7th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA'10
, pp. 173-182
-
-
Mrdovic, S.1
Drazenovic, B.2
-
26
-
-
79952917584
-
A functional framework to evade network IDS
-
Koloa, Hawaii, USA
-
Pastrana S, Orfila A, Ribagorda A. A functional framework to evade network IDS. In: Proceedings of the 44th IEEE Hawaii international conference on systems sciences, Koloa, Hawaii, USA; 2011, p. 1-10.
-
(2011)
Proceedings of the 44th IEEE Hawaii International Conference on Systems Sciences
, pp. 1-10
-
-
Pastrana, S.1
Orfila, A.2
Ribagorda, A.3
-
27
-
-
84867868962
-
Evaluation of classification algorithms for intrusion detection in MANETs
-
S. Pastrana, A. Mitrokotsa, A. Orfila, and P. Peris-Lopez Evaluation of classification algorithms for intrusion detection in MANETs Knowl-Based Syst 36 2012 217 225
-
(2012)
Knowl-Based Syst
, vol.36
, pp. 217-225
-
-
Pastrana, S.1
Mitrokotsa, A.2
Orfila, A.3
Peris-Lopez, P.4
-
28
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
DOI 10.1109/SP.2006.26, 1623998, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
Perdisci R, Dagon D, Lee W, Fogla P, Sharif M. Misleading worm signature generators using deliberate noise injection. In: Proceedings of the 2006 IEEE symposium on security and privacy. IEEE; 2006, p. 17-31. (Pubitemid 44753709)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Foglat, P.4
Sharif, M.5
-
29
-
-
61749083929
-
McPAD a multiple classifier system for accurate payload-based anomaly detection
-
R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee McPAD a multiple classifier system for accurate payload-based anomaly detection Comput Netw 53 2009 864 881
-
(2009)
Comput Netw
, vol.53
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
30
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc., Syracuse, NY, USA
-
Ptacek TH, Newsham TN. Insertion, evasion, and denial of service: eluding network intrusion detection. Technical Report, Secure Networks, Inc., Syracuse, NY, USA; 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
31
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
USENIX, Seattle, WA, USA
-
Roesch M. Snort: lightweight intrusion detection for networks. In: Proceedings of the 13th systems administration conference, USENIX, Seattle, WA, USA; 1999. p. 229-38.
-
(1999)
Proceedings of the 13th Systems Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
32
-
-
84872248901
-
A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques
-
K. Satpute, S. Agrawal, J. Agrawal, and S. Sharma A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques Adv Intell Syst Comput 199 2013 441 452
-
(2013)
Adv Intell Syst Comput
, vol.199
, pp. 441-452
-
-
Satpute, K.1
Agrawal, S.2
Agrawal, J.3
Sharma, S.4
-
33
-
-
42449117164
-
SP 800-94. Guide to intrusion detection and prevention systems (IDPS)
-
Gaithersburg, MD, United States
-
Scarfone KA, Mell PM. SP 800-94. Guide to intrusion detection and prevention systems (IDPS), Technical Report, Gaithersburg, MD, United States; 2007.
-
(2007)
Technical Report
-
-
Scarfone, K.A.1
Mell, P.M.2
-
35
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
IEEE Computer Society, Washington, DC, USA
-
Sommer R, Paxson V. Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of the 2010 IEEE symposium on security and privacy, SP '10, IEEE Computer Society, Washington, DC, USA; 2010. p. 305-16.
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
36
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
ACM, New York, NY, USA
-
Song Y, Locasto ME, Stavrou A, Keromytis AD, Stolfo SJ. On the infeasibility of modeling polymorphic shellcode. In: Proceedings of the 14th ACM conference on computer and communications security, CCS '07, ACM, New York, NY, USA; 2007. p. 541-51.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07
, pp. 541-551
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
37
-
-
84874114774
-
Toward a more practical unsupervised anomaly detection system
-
J. Song, H. Takakura, Y. Okabe, and K. Nakao Toward a more practical unsupervised anomaly detection system Inf Sci Int J 231 2013 4 14
-
(2013)
Inf Sci Int J
, vol.231
, pp. 4-14
-
-
Song, J.1
Takakura, H.2
Okabe, Y.3
Nakao, K.4
-
38
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
ACM, Washington, DC, USA
-
Vigna G, Robertson W, Balzarotti D. Testing network-based intrusion detection signatures using mutant exploits. In: Proceedings of the 11th ACM conference on computer and communications security, ACM, Washington, DC, USA; 2004. p. 21.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 21
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
39
-
-
50249136649
-
Efficient and robust TCP stream normalization
-
Oakland, CA, USA
-
Vutukuru M, Balakrishnan H, Paxson V. Efficient and robust TCP stream normalization. In: Proceedings of the 2008 IEEE symposium on security and privacy. Oakland, CA, USA; 2008. p. 96-110.
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 96-110
-
-
Vutukuru, M.1
Balakrishnan, H.2
Paxson, V.3
-
42
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings LNCS
-
Wang K, Parekh JJ, Stolfo SJ. Anagram: a content anomaly detector resistant to mimicry attack. In: Proceedings of the 9th international symposium on recent advances in intrusion detection. Lecture notes in computer science, vol. 4219. Springer, Hamburg, Germany; 2006. p. 226-48. (Pubitemid 44617855)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
|