-
1
-
-
84908476074
-
-
Snort (retrieved February 2014)
-
Snort. Snort, 2014. < http://www.snort.org/ > (retrieved February 2014).
-
(2014)
Snort
-
-
-
2
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: IEEE S&P, 1999, pp. 120-132.
-
(1999)
IEEE S&P
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
3
-
-
84908490563
-
Automatically inferring the evolution of malicious activity on the internet
-
Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck, Automatically inferring the evolution of malicious activity on the internet, in: NDSS, 2013.
-
(2013)
NDSS
-
-
Venkataraman, S.1
Brumley, D.2
Sen, S.3
Spatscheck, O.4
-
4
-
-
0029716418
-
A sense of self for unix processes
-
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff, A sense of self for unix processes, in: IEEE S&P, 1996, pp. 120-128.
-
(1996)
IEEE S&P
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
5
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
Wei Wang, Xiaohong Guan, Xiangliang Zhang, and Liwei Yang Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data Comput. Secur. 25 7 2006 539 550
-
(2006)
Comput. Secur.
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
6
-
-
85178287263
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, Drebin: efficient and explainable detection of android malware in your pocket, in: NDSS, 2014.
-
(2014)
NDSS
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
7
-
-
84866608644
-
Profiledroid: Multi-layer profiling of android applications
-
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, Profiledroid: multi-layer profiling of android applications, in: MOBICOM, 2012, pp. 137-148.
-
(2012)
MOBICOM
, pp. 137-148
-
-
Wei, X.1
Gomez, L.2
Neamtiu, I.3
Faloutsos, M.4
-
8
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis, Casting out demons: sanitizing training data for anomaly sensors, in: IEEE S&P, 2008, pp. 81-95.
-
(2008)
IEEE S&P
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
9
-
-
36949007362
-
Challenging the anomaly detection paradigm: A provocative discussion
-
Carrie Gates, Carol Taylor, Challenging the anomaly detection paradigm: a provocative discussion, in: NSPW, 2006, pp. 21-29.
-
(2006)
NSPW
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
10
-
-
85166317163
-
Approaches to online learning and concept drift for user identification in computer security
-
Terran Lane, Carla E. Brodley, Approaches to online learning and concept drift for user identification in computer security, in: KDD, 1998, pp. 259-263.
-
(1998)
KDD
, pp. 259-263
-
-
Lane, T.1
Brodley, C.E.2
-
11
-
-
78650924299
-
-
(retrieved February 2014)
-
KDD-Data, Kdd cup 1999 Data, 1999. < http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html > (retrieved February 2014).
-
(1999)
KDD-Data, Kdd Cup 1999 Data
-
-
-
12
-
-
26844454842
-
Adaptive diagnosis in distributed systems
-
Irina Rish, Mark Brodie, Sheng Ma, Natalia Odintsova, Alina Beygelzimer, Genady Grabarnik, and Karina Hernandez Adaptive diagnosis in distributed systems IEEE Trans. Neural Networks 16 5 2005 1088 1109
-
(2005)
IEEE Trans. Neural Networks
, vol.16
, Issue.5
, pp. 1088-1109
-
-
Rish, I.1
Brodie, M.2
Ma, S.3
Odintsova, N.4
Beygelzimer, A.5
Grabarnik, G.6
Hernandez, K.7
-
13
-
-
84908495077
-
-
(retrieved February 2014)
-
IBM, Autonomic Computing, 2014. < http://www.ibm.com/autonomic > (retrieved February 2014).
-
(2014)
IBM, Autonomic Computing
-
-
-
14
-
-
33847172327
-
Clustering by passing messages between data points
-
Brendan J. Frey, and Delbert Dueck Clustering by passing messages between data points Science 315 5814 2007 972 976
-
(2007)
Science
, vol.315
, Issue.5814
, pp. 972-976
-
-
Frey, B.J.1
Dueck, D.2
-
15
-
-
84901851210
-
Data streaming with affinity propagation
-
Xiangliang Zhang, Cyril Furtlehner, Michèle Sebag, Data streaming with affinity propagation, in: ECML/PKDD, 2008.
-
(2008)
ECML/PKDD
-
-
Xiangliang Zhang, C.1
-
17
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Matthias Schonlau, and Martin Theus Detecting masquerades in intrusion detection based on unpopular commands Inf. Process. Lett. 76 1-2 2000 33 38
-
(2000)
Inf. Process. Lett.
, vol.76
, Issue.12
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
18
-
-
55949124178
-
Fast intrusion detection based on a non-negative matrix factorization model
-
Xiaohong Guan, Wei Wang, and Xiangliang Zhang Fast intrusion detection based on a non-negative matrix factorization model J. Network Comput. Appl. 32 1 2009 31 44
-
(2009)
J. Network Comput. Appl.
, vol.32
, Issue.1
, pp. 31-44
-
-
Guan, X.1
Wang, W.2
Zhang, X.3
-
19
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
Wei Wang, Xiaohong Guan, and Xiangliang Zhang Processing of massive audit data streams for real-time anomaly intrusion detection Comput. Commun. 31 1 2008 58 72
-
(2008)
Comput. Commun.
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
20
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Ke Wang, Salvatore J. Stolfo, Anomalous payload-based network intrusion detection, in: RAID, 2004, pp. 203-222.
-
(2004)
RAID
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
21
-
-
84872967561
-
Anomaly intrusion detection based on pls feature extraction and core vector machine
-
Xu sheng Gan, Jing shun Duanmu, Jia fu Wang, and Wei Cong Anomaly intrusion detection based on pls feature extraction and core vector machine Knowl.-Based Syst. 40 2013 1 6
-
(2013)
Knowl.-Based Syst.
, vol.40
, pp. 1-6
-
-
Gan, X.S.1
Duanmu, J.S.2
Wang, J.F.3
Cong, W.4
-
22
-
-
14844319067
-
Anomaly detection of web-based attacks
-
Christopher Krügel, Giovanni Vigna, Anomaly detection of web-based attacks, in: ACM CCS, 2003, pp. 251-261.
-
(2003)
ACM CCS
, pp. 251-261
-
-
Christopher Krügel, G.1
-
23
-
-
38149142569
-
Comparing anomaly detection techniques for http
-
Kenneth L. Ingham, Hajime Inoue, Comparing anomaly detection techniques for http, in: RAID, 2007, pp. 42-62.
-
(2007)
RAID
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
24
-
-
85180633963
-
Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
-
Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo, Spectrogram: a mixture-of-markov-chains model for anomaly detection in web traffic, in: NDSS, 2009.
-
(2009)
NDSS
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.J.3
-
25
-
-
79955482186
-
Hmmpayl: An intrusion detection system based on hidden markov models
-
Davide Ariu, Roberto Tronci, and Giorgio Giacinto Hmmpayl: an intrusion detection system based on hidden markov models Comput. Secur. 30 4 2011 221 241
-
(2011)
Comput. Secur.
, vol.30
, Issue.4
, pp. 221-241
-
-
Ariu, D.1
Tronci, R.2
Giacinto, G.3
-
26
-
-
84908490561
-
Warningbird: Detecting suspicious urls in twitter stream
-
Sangho Lee, Jong Kim, Warningbird: detecting suspicious urls in twitter stream, in: NDSS, 2012.
-
(2012)
NDSS
-
-
-
27
-
-
84885179737
-
Semantic security against web application attacks
-
Abdul Razzaq, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, and Peter Charles Bloodsworth Semantic security against web application attacks Inf. Sci. 254 1 2014 19 38
-
(2014)
Inf. Sci.
, vol.254
, Issue.1
, pp. 19-38
-
-
Razzaq, A.1
Latif, K.2
Farooq Ahmad, H.3
Hur, A.4
Anwar, Z.5
Bloodsworth, P.C.6
-
28
-
-
84866485165
-
Policy-enhanced anfis model to counter soap-related attacks
-
Gaik-Yee Chan, Chien-Sing Lee, and Swee-Huay Heng Policy-enhanced anfis model to counter soap-related attacks Knowl.-Based Syst. 35 2012 64 76
-
(2012)
Knowl.-Based Syst.
, vol.35
, pp. 64-76
-
-
Chan, G.-Y.1
Lee, C.-S.2
Heng, S.-H.3
-
29
-
-
84874750531
-
Discovering fuzzy association rule patterns and increasing sensitivity analysis of xml-related attacks
-
Gaik-Yee Chan, Chien-Sing Lee, and Swee-Huay Heng Discovering fuzzy association rule patterns and increasing sensitivity analysis of xml-related attacks J. Network Comput. Appl. 36 2 2013 829 842
-
(2013)
J. Network Comput. Appl.
, vol.36
, Issue.2
, pp. 829-842
-
-
Chan, G.-Y.1
Lee, C.-S.2
Heng, S.-H.3
-
30
-
-
80053139318
-
Defending web services against denial of service attacks using client puzzles
-
Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu, Defending web services against denial of service attacks using client puzzles, in: ICWS, 2011, pp. 25-32.
-
(2011)
ICWS
, pp. 25-32
-
-
Suriadi, S.1
Stebila, D.2
Clark, A.J.3
Liu, H.4
-
31
-
-
77957549538
-
Fuzzy rule-base based intrusion detection system on application layer
-
S. Sangeetha, S. Haripriya, S.G. Mohana Priya, V. Vaidehi, N. Srinivasan, Fuzzy rule-base based intrusion detection system on application layer, in: CNSA, 2010, pp. 27-36.
-
(2010)
CNSA
, pp. 27-36
-
-
Sangeetha, S.1
Haripriya, S.2
Mohana Priya, S.G.3
Vaidehi, V.4
Srinivasan, N.5
-
34
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Kingsly Leung, Christopher Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, in: Proc. 28th Australasian CS Conf., CRPITV, vol. 38, 2005, pp. 333-342.
-
(2005)
Proc. 28th Australasian CS Conf., CRPITV
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
35
-
-
76649108863
-
Adaptive anomaly detection via self-calibration and dynamic updating
-
Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Adaptive anomaly detection via self-calibration and dynamic updating, in: RAID, 2009, pp. 41-60.
-
(2009)
RAID
, pp. 41-60
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
-
36
-
-
76649111697
-
Runtime monitoring and dynamic reconfiguration for intrusion detection systems
-
Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel, Runtime monitoring and dynamic reconfiguration for intrusion detection systems, in: RAID, 2009, pp. 61-80.
-
(2009)
RAID
, pp. 61-80
-
-
Martin Rehák, E.1
-
37
-
-
84896405910
-
Adaptive and online data anomaly detection for wireless sensor systems
-
(available online first)
-
Murad A. Rassama, Anazida Zainala, and Mohd. Aizaini Maarofaand Adaptive and online data anomaly detection for wireless sensor systems Knowl.-Based Syst. 2014 (available online first)
-
(2014)
Knowl.-Based Syst.
-
-
Rassama, M.A.1
Zainala, A.2
Aizaini Maarofaand, M.3
-
39
-
-
76649142367
-
Protecting a moving target: Addressing web application concept drift
-
Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna, Protecting a moving target: addressing web application concept drift, in: RAID, 2009, pp. 21-40.
-
(2009)
RAID
, pp. 21-40
-
-
Federico, M.1
William, K.R.2
Christopher, K.3
Giovanni, V.4
-
40
-
-
85180537732
-
Effective anomaly detection with scarce training data
-
William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna, Effective anomaly detection with scarce training data, in: NDSS, 2010.
-
(2010)
NDSS
-
-
Robertson, W.K.1
Maggi, F.2
Kruegel, C.3
Vigna, G.4
-
41
-
-
84865659147
-
-
Wei Wang, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, A general framework for adaptive and online detection of web attacks, in: WWW, 2009, pp. 1141-1142.
-
(2009)
A General Framework for Adaptive and Online Detection of Web Attacks
, pp. 1141-1142
-
-
Wang, W.1
Masseglia, F.2
Guyet, T.3
Quiniou, R.4
Cordier, M.5
-
45
-
-
0034247885
-
Sequential Karhunen-Loeve basis extraction and its application to images
-
Avraham Levy, and Michael Lindenbaum Sequential Karhunen-Loeve basis extraction and its application to images IEEE Trans. Image Process. 9 2000 1371 1374
-
(2000)
IEEE Trans. Image Process.
, vol.9
, pp. 1371-1374
-
-
Levy, A.1
Lindenbaum, M.2
-
46
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
Yihua Liao, V. Rao Vemuri, Using text categorization techniques for intrusion detection, in: USENIX Security Symposium, 2002, pp. 51-59.
-
(2002)
USENIX Security Symposium
, pp. 51-59
-
-
Liao, Y.1
Rao Vemuri, V.2
-
47
-
-
71749108310
-
Constructing attribute weights from computer audit data for effective intrusion detection
-
Wei Wang, Xiangliang Zhang, and Sylvain Gombault Constructing attribute weights from computer audit data for effective intrusion detection J. Sys. Soft. 82 12 2009 1974 1981
-
(2009)
J. Sys. Soft.
, vol.82
, Issue.12
, pp. 1974-1981
-
-
Wang, W.1
Zhang, X.2
Gombault, S.3
-
48
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Bernhard Schölkopf, John C. Platt, John Shawe-Taylor, Alex J. Smola, and Robert C. Williamson Estimating the support of a high-dimensional distribution Neural Comput. 13 7 2001 1443 1471
-
(2001)
Neural Comput.
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
51
-
-
83455223163
-
Using generalization and characterization techniques in the anomaly-based detection of web attacks
-
William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer, Using generalization and characterization techniques in the anomaly-based detection of web attacks, in: NDSS, 2006.
-
(2006)
NDSS
-
-
William, K.1
Robertson2
-
52
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
Software
-
Chih-Chung Chang, and Chih-Jen Lin LIBSVM: a library for support vector machines ACM Trans. Intell. Syst. Technol. 2 2011 27:1 27:27 Software available at http://www.csie.ntu.edu.tw/∼cjlin/libsvm.
-
(2011)
ACM Trans. Intell. Syst. Technol.
, vol.2
, pp. 271-2727
-
-
Chang, C.-C.1
Lin, C.-J.2
-
53
-
-
71049172937
-
Toward autonomic grids: Analyzing the job flow with affinity streaming
-
Xiangliang Zhang, Cyril Furtlehner, Julien Perez, Cécile Germain-Renaud, Michèle Sebag, Toward autonomic grids: analyzing the job flow with affinity streaming, in: KDD, 2009, pp. 987-996.
-
(2009)
KDD
, pp. 987-996
-
-
Xiangliang Zhang, C.1
-
54
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
John McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory ACM Trans. Inf. Syst. Secur. 3 4 2000 262 294
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
55
-
-
77949788147
-
Attribute normalization in network intrusion detection
-
Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, Attribute normalization in network intrusion detection, in: ISPAN, 2009, pp. 448-453.
-
(2009)
ISPAN
, pp. 448-453
-
-
Wang, W.1
Zhang, X.2
Gombault, S.3
Knapskog, S.J.4
|