-
1
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E. An intrusion-detection model. IEEE Trans. Softw. Eng. 1987, 13, 222-232.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, pp. 222-232
-
-
Denning, D.E.1
-
2
-
-
26944450506
-
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection
-
Ho, T., Cheung, D., Liu, H., Eds, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
-
Li, Z.; Das, A.; Zhou, J. USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. In Advances in Knowledge Discovery and Data Minin, Ho, T., Cheung, D., Liu, H., Eds.; Volume 3518, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; pp 702-712.
-
(2005)
Advances in Knowledge Discovery and Data Minin
, vol.3518
, pp. 702-712
-
-
Li, Z.1
Das, A.2
Zhou, J.3
-
3
-
-
84890880565
-
Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems
-
Cheng, T.H.; Lin, Y.D.; Lai, Y.C.; Lin, P.C. Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems. IEEE Commun. Surv. Tutor. 2012, 14, 1011-1020.
-
(2012)
IEEE Commun. Surv. Tutor.
, vol.14
, pp. 1011-1020
-
-
Cheng, T.H.1
Lin, Y.D.2
Lai, Y.C.3
Lin, P.C.4
-
4
-
-
84912138935
-
Identification of malware activities with rules
-
Warsaw, Poland, 7-10 September, Ganzha, M., Maciaszek, L., Paprzycki, M., Eds.;
-
Jasiul, B.; Śliwa, J.; Gleba, K.; Szpyrka, M. Identification of malware activities with rules. In Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS), Warsaw, Poland, 7-10 September 2014; Ganzha, M., Maciaszek, L., Paprzycki, M., Eds.; pp. 101-110.
-
(2014)
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems (FedCSIS)
, pp. 101-110
-
-
Jasiul, B.1
Śliwa, J.2
Gleba, K.3
Szpyrka, M.4
-
5
-
-
80955142736
-
Analysis of update delays in signature-based network intrusion detection systems
-
Gascon, H.; Orfila, A.; Blasco, J. Analysis of update delays in signature-based network intrusion detection systems. Comput. Secur. 2011, 30, 613-624.
-
(2011)
Comput. Secur.
, vol.30
, pp. 613-624
-
-
Gascon, H.1
Orfila, A.2
Blasco, J.3
-
7
-
-
33846200876
-
Entropy Based Worm and Anomaly Detection in Fast IP Networks
-
Linköping University, Linköping, Sweden, 13-15 June
-
Wagner, A.; Plattner, B. Entropy Based Worm and Anomaly Detection in Fast IP Networks. In Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05, Linköping University, Linköping, Sweden, 13-15 June 2005; pp 172-177.
-
(2005)
Proceedings of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
8
-
-
63049084484
-
An Empirical Evaluation of Entropy-based Traffic Anomaly Detection
-
Vouliagmeni, Greece, 20-22 October
-
Nychis, G.; Sekar, V.; Andersen, D.G.; Kim, H.; Zhang, H. An Empirical Evaluation of Entropy-based Traffic Anomaly Detection. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement (IMC '08), Vouliagmeni, Greece, 20-22 October 2008 ; pp. 151-156.
-
(2008)
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement (IMC '08)
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
9
-
-
84917712953
-
-
Ph.D. Thesis, ETH, Zürich, Switzerland, Ph.D. Dissertation Nr. 20929
-
Tellenbach, B. Detection, Classification and Visualization of Anomalies using Generalized Entropy Metric. Ph.D. Thesis, ETH, Zürich, Switzerland, 2012; Ph.D. Dissertation Nr. 20929.
-
(2012)
Detection, Classification and Visualization of Anomalies using Generalized Entropy Metric
-
-
Tellenbach, B.1
-
10
-
-
79957530146
-
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
-
Xiang, Y.; Li, K.; Zhou, W. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Trans. Inf. Forensics Secur. 2011, 6, 426-437.
-
(2011)
IEEE Trans. Inf. Forensics Secur.
, vol.6
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
11
-
-
42149159398
-
Mutual information applied to anomaly detection
-
Kopylova, Y.; Buell, D.A.; Huang, C.T.; Janies, J. Mutual information applied to anomaly detection. J. Commun. Netw. 2008, 10, 89-97.
-
(2008)
J. Commun. Netw.
, vol.10
, pp. 89-97
-
-
Kopylova, Y.1
Buell, D.A.2
Huang, C.T.3
Janies, J.4
-
12
-
-
84930332721
-
-
Available online, accessed on 16 April 2015
-
HP-The Bot Threat. Available online: http://www.bitpipe.com/detail/RES/1384218191_706. html (accessed on 16 April 2015).
-
-
-
-
13
-
-
84930320018
-
-
Sophos-Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. Available online, accessed on 16 April
-
Sophos-Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. Available online: https://cccure.training/m/articles/view/Sophos-Security-Threat-Report-2014 (accessed on 16 April 2015).
-
(2015)
-
-
-
14
-
-
84931066627
-
The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework
-
Purdue University, West Lafayette, IN, USA, 24-25 March
-
Scanlon, M.; Kechadi, M.T. The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework. In Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS 2014, Purdue University, West Lafayette, IN, USA, 24-25 March 2014; pp 287-293.
-
(2014)
Proceedings of the 9th International Conference on Cyber Warfare and Security (ICCWS 2014
, pp. 287-293
-
-
Scanlon, M.1
Kechadi, M.T.2
-
15
-
-
67649977471
-
Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics
-
Seoul, Korea, 1-3 April
-
Tellenbach, B.; Burkhart, M.; Sornette, D.; Maillart, T. Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics. In Proceedings of the 10th International Conference on Passive and Active Network Measurement (PAM'09, Seoul, Korea, 1-3 April 2009; pp 239-248.
-
(2009)
Proceedings of the 10th International Conference on Passive and Active Network Measurement (PAM'09
, pp. 239-248
-
-
Tellenbach, B.1
Burkhart, M.2
Sornette, D.3
Maillart, T.4
-
16
-
-
84930334688
-
-
Available online, accessed on 16 April 2015
-
NfSen-Netflow Sensor. Available online: http://nfsen.sourceforge.net (accessed on 16 April 2015).
-
-
-
-
17
-
-
0141427794
-
A Signal Analysis of Network Traffic Anomalies
-
Marseille, France, 6-8 November
-
Barford, P.; Kline, J.; Plonka, D.; Ron, A. A Signal Analysis of Network Traffic Anomalies. In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW '02, Marseille, France, 6-8 November 2002; pp 71-82.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW '02
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
18
-
-
4544268957
-
-
Presented at IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea, 19-23 April
-
Kim, M.S.; Kong, H.J.; Hong, S.C.; Chung, S.H.; Hong, J. A flow-based method for abnormal network traffic detection. Presented at IEEE/IFIP Network Operations and Management Symposium (NOMS 2004), Seoul, Korea, 19-23 April 2004; pp. 599-612.
-
(2004)
A flow-based method for abnormal network traffic detection
, pp. 599-612
-
-
Kim, M.S.1
Kong, H.J.2
Hong, S.C.3
Chung, S.H.4
Hong, J.5
-
19
-
-
84930344566
-
NtopNg-High-Speed Web-based Traffic Analysis and Flow Collection
-
Available online, accessed on 16 April 2015
-
NtopNg-High-Speed Web-based Traffic Analysis and Flow Collection. Available online:http://www.ntop.org (accessed on 16 April 2015).
-
-
-
-
20
-
-
84991833843
-
-
Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA
-
Witten, I.H.; Frank, E.; Hall, M.A. Data Mining: Practical Machine Learning Tools and Techniques, 3rd ed.; Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA, 2011.
-
(2011)
Data Mining: Practical Machine Learning Tools and Techniques, 3rd ed.
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
-
23
-
-
0003684449
-
-
Springer: New York, NY, USA
-
Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning: Data Mining, Inference and Prediction, 2 ed.; Springer: New York, NY, USA, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
24
-
-
68049121093
-
Anomaly Detection: A Survey
-
Chandola, V.; Banerjee, A.; Kumar, V. Anomaly Detection: A Survey. ACM Comput. Surv. 2009, 41, 15:1-15:58.
-
(2009)
ACM Comput. Surv.
, vol.41
, pp. 15.1-15.58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
25
-
-
7544223741
-
A Survey of Outlier Detection Methodologies
-
Hodge, V.; Austin, J. A Survey of Outlier Detection Methodologies. Artif. Intell. Rev. 2004, 22, 85-126.
-
(2004)
Artif. Intell. Rev.
, vol.22
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
26
-
-
4344659702
-
Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy
-
Estevez-Tapiador, J.M.; Garcia-Teodoro, P.; Diaz-Verdejo, J.E. Anomaly Detection Methods in Wired Networks: A Survey and Taxonomy. Comput. Commun. 2004, 27, 1569-1584.
-
(2004)
Comput. Commun.
, vol.27
, pp. 1569-1584
-
-
Estevez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
27
-
-
34250315640
-
An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends
-
Patcha, A.; Park, J.M. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Comput. Netw. 2007, 51, 3448-3470.
-
(2007)
Comput. Netw.
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
29
-
-
70349472866
-
A Survey on Internet Traffic Identification
-
Callado, A.; Kamienski, C.; Szabo, G.; Gero, B.; Kelner, J.; Fernandes, S.; Sadok, D. A Survey on Internet Traffic Identification. IEEE Commun. Surv. Tutor. 2009, 11, 37-52.
-
(2009)
IEEE Commun. Surv. Tutor.
, vol.11
, pp. 37-52
-
-
Callado, A.1
Kamienski, C.2
Szabo, G.3
Gero, B.4
Kelner, J.5
Fernandes, S.6
Sadok, D.7
-
30
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
Garcia-Teodoro, P.; Diaz-Verdejo, J.; Macia-Fernandez, G.; Vazquez, E. Anomaly-based network intrusion detection: Techniques, systems and challenges. Comput. Secur. 2009, 28, 18-28.
-
(2009)
Comput. Secur.
, vol.28
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
31
-
-
84894646147
-
Network anomaly detection: methods, systems and tools
-
Bhuyan, M.; Bhattacharyya, D.; Kalita, J. Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutor. 2013, 16, 1-34.
-
(2013)
IEEE Commun. Surv. Tutor.
, vol.16
, pp. 1-34
-
-
Bhuyan, M.1
Bhattacharyya, D.2
Kalita, J.3
-
32
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
Sperotto, A.; Schaffrath, G.; Sadre, R.; Morariu, C.; Pras, A.; Stiller, B. An Overview of IP Flow-Based Intrusion Detection. IEEE Commun. Surv. Tutor. 2010, 12, 343-356.
-
(2010)
IEEE Commun. Surv. Tutor.
, vol.12
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
33
-
-
34548334363
-
-
Technical Report UCB/EECS-2007-10; EECS Department, University of California: Berkeley, CA, USA
-
Huang, L.; Nguyen, X.; Garofalakis, M.; Jordan, M.; Joseph, A.D.; Taft, N. In-Network PCA and Anomaly Detection; Technical Report UCB/EECS-2007-10; EECS Department, University of California: Berkeley, CA, USA, 2007.
-
(2007)
In-Network PCA and Anomaly Detection
-
-
Huang, L.1
Nguyen, X.2
Garofalakis, M.3
Jordan, M.4
Joseph, A.D.5
Taft, N.6
-
34
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, USA, 19-22 November
-
Shyu, M.-L.; Chen, S.-C.; Sarinnapakorn, K.; Chang, L. A novel anomaly detection scheme based on principal component classifier. In Proceedings of IEEE Foundations and New Directions of Data Mining Worksho, in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, USA, 19-22 November 2003; pp 171-179.
-
(2003)
Proceedings of IEEE Foundations and New Directions of Data Mining Worksho
, pp. 171-179
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
35
-
-
84878266577
-
Anomaly Detection via Online Oversampling Principal Component Analysis
-
Lee, Y.J.; Yeh, Y.R.; Wang, Y.C.F. Anomaly Detection via Online Oversampling Principal Component Analysis. IEEE Trans. Knowl. Data Eng. 2013, 25, 1460-1470.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, pp. 1460-1470
-
-
Lee, Y.J.1
Yeh, Y.R.2
Wang, Y.C.F.3
-
36
-
-
59949095579
-
Network Anomaly Detection Based on Wavelet Analysis
-
Lu, W.; Ghorbani, A.A. Network Anomaly Detection Based on Wavelet Analysis. EURASIP J. Adv. Sig. Proc. 2009, 2009, doi:10.1155/2009/837601.
-
(2009)
EURASIP J. Adv. Sig. Proc.
, vol.2009
-
-
Lu, W.1
Ghorbani, A.A.2
-
37
-
-
49649105240
-
Detecting Network Anomalies Using Different Wavelet Basis Functions
-
Halifax, Nova Scotia, Canada, 5-8 May
-
Lu, W.; Tavallaee, M.; Ghorbani, A.A. Detecting Network Anomalies Using Different Wavelet Basis Functions. In Proceedings of Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008, Halifax, Nova Scotia, Canada, 5-8 May 2008; pp 149-156.
-
(2008)
Proceedings of Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008
, pp. 149-156
-
-
Lu, W.1
Tavallaee, M.2
Ghorbani, A.A.3
-
38
-
-
77956471727
-
-
Presented at 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), Kuching, Sarawak, Malaysia, 15-18 June
-
Limthong, K.; Watanapongse, P.; Kensuke, F. A wavelet-based anomaly detection for outbound network traffic. Presented at 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), Kuching, Sarawak, Malaysia, 15-18 June 2010; pp. 1-6.
-
(2010)
A wavelet-based anomaly detection for outbound network traffic
, pp. 1-6
-
-
Limthong, K.1
Watanapongse, P.2
Kensuke, F.3
-
39
-
-
1942436335
-
Robustness of the Markov-chain model for cyber-attack detection
-
Ye, N.; Zhang, Y.; Borror, C.M. Robustness of the Markov-chain model for cyber-attack detection. IEEE Trans. Reliab. 2004, 53, 116-123.
-
(2004)
IEEE Trans. Reliab.
, vol.53
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
40
-
-
84885669666
-
A Multi-order Markov Chain Based Scheme for Anomaly Detection
-
COMPSAC Workshops 2013, Kyoto, Japan, 22-26 July
-
Sha, W.; Zhu, Y.; Huang, T.; Qiu, M.; Zhu, Y.; Zhang, Q. A Multi-order Markov Chain Based Scheme for Anomaly Detection. In Proceedings of IEEE 37th Annual Computer Software and Applications Conferen, COMPSAC Workshops 2013, Kyoto, Japan, 22-26 July 2013; pp 83-88.
-
(2013)
Proceedings of IEEE 37th Annual Computer Software and Applications Conferen
, pp. 83-88
-
-
Sha, W.1
Zhu, Y.2
Huang, T.3
Qiu, M.4
Zhu, Y.5
Zhang, Q.6
-
41
-
-
84930358040
-
Unsupervised Clustering Approach for Network Anomaly Detection
-
Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany
-
Syarif, I.; Prugel-Bennett, A.; Wills, G. Unsupervised Clustering Approach for Network Anomaly Detection. In Networked Digital Technologie, Volume 293, Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany, 2012; pp 135-145.
-
(2012)
Networked Digital Technologie
, vol.293
, pp. 135-145
-
-
Syarif, I.1
Prugel-Bennett, A.2
Wills, G.3
-
42
-
-
84917687883
-
Visualize Network Anomaly Detection By Using K-Means Clustering Algorithm
-
Riad, A.; Elhenawy, I.; Hassan, A.; Awadallah, N. Visualize Network Anomaly Detection By Using K-Means Clustering Algorithm. Int. J. Comput. Netw. Commun. 2013, 5, doi:10.5121/ijcnc.2013.5514.
-
(2013)
Int. J. Comput. Netw. Commun.
, vol.5
-
-
Riad, A.1
Elhenawy, I.2
Hassan, A.3
Awadallah, N.4
-
43
-
-
84930317380
-
Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data
-
Bazan, J.; Szpyrka, M.; Szczur, A.; Dydo, L.; Wojtowicz, H. Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data. Fundam. Inform. 2015, in press.
-
(2015)
Fundam. Inform.
-
-
Bazan, J.1
Szpyrka, M.2
Szczur, A.3
Dydo, L.4
Wojtowicz, H.5
-
44
-
-
75149179043
-
Histogram-based Traffic Anomaly Detection
-
Kind, A.; Stoecklin, M.P.; Dimitropoulos, X. Histogram-based Traffic Anomaly Detection. IEEE Trans. Netw. Serv. Manag. 2009, 6, 110-121.
-
(2009)
IEEE Trans. Netw. Serv. Manag.
, vol.6
, pp. 110-121
-
-
Kind, A.1
Stoecklin, M.P.2
Dimitropoulos, X.3
-
45
-
-
8344259983
-
Flow Classification by Histograms: Or How to Go on Safari in the Internet
-
Columbia University, New York, NY, USA, 12-16 June
-
Soule, A.; Salamatia, K.; Taft, N.; Emilion, R.; Papagiannaki, K. Flow Classification by Histograms: Or How to Go on Safari in the Internet. In Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS-Performance 2004, Columbia University, New York, NY, USA, 12-16 June 2004; pp 49-60.
-
(2004)
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS-Performance 2004
, pp. 49-60
-
-
Soule, A.1
Salamatia, K.2
Taft, N.3
Emilion, R.4
Papagiannaki, K.5
-
46
-
-
43949111011
-
A Two-layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models
-
Cleveland, OH, USA, 29-30 April
-
Stoecklin, M.P.; Le Boudec, J.Y.; Kind, A. A Two-layered Anomaly Detection Technique Based on Multi-modal Flow Behavior Models. In Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM'08, Cleveland, OH, USA, 29-30 April 2008; pp 212-221.
-
(2008)
Proceedings of the 9th International Conference on Passive and Active Network Measurement (PAM'08
, pp. 212-221
-
-
Stoecklin, M.P.1
Le Boudec, J.Y.2
Kind, A.3
-
47
-
-
77956376882
-
Anomaly Extraction in Backbone Networks Using Association Rules
-
Chicago, IL, USA, 4-6 November
-
Brauckhoff, D.; Dimitropoulos, X.;Wagner, A.; Salamatian, K. Anomaly Extraction in Backbone Networks Using Association Rules. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC '09, Chicago, IL, USA, 4-6 November 2009; pp 28-34.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC '09
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
48
-
-
84921751943
-
Entropy-Based Characterization of Internet Background Radiation
-
Iglesias, F.; Zseby, T. Entropy-Based Characterization of Internet Background Radiation. Entropy 2014, 17, 74-101.
-
(2014)
Entropy
, vol.17
, pp. 74-101
-
-
Iglesias, F.1
Zseby, T.2
-
49
-
-
0242341156
-
An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks
-
Available online, accessed on 16 April 2015
-
Harrington, D.; Presuhn, R.; Wijnen, B. An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. Available online: http://www.ietf. org/rfc/rfc3411.txt (accessed on 16 April 2015).
-
-
-
Harrington, D.1
Presuhn, R.2
Wijnen, B.3
-
51
-
-
78751649037
-
DoS attacks exploiting signaling in {UMTS} and {IMS}
-
Kambourakis, G.; Kolias, C.; Gritzalis, S.; Park, J.H. DoS attacks exploiting signaling in {UMTS} and {IMS}. Comput. Commun. 2011, 34, 226-235.
-
(2011)
Comput. Commun.
, vol.34
, pp. 226-235
-
-
Kambourakis, G.1
Kolias, C.2
Gritzalis, S.3
Park, J.H.4
-
52
-
-
84870360312
-
Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
-
Choi, K.; Chen, X.; Li, S.; Kim, M.; Chae, K.; Na, J. Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid. Energies 2012, 5, 4091-4109.
-
(2012)
Energies
, vol.5
, pp. 4091-4109
-
-
Choi, K.1
Chen, X.2
Li, S.3
Kim, M.4
Chae, K.5
Na, J.6
-
53
-
-
74349126900
-
Fair incentive mechanism with pyramidal structure for peer-to-peer networks
-
Liu, Y.; Xiong, N.; Park, J.; Yang, C.; Xu, K. Fair incentive mechanism with pyramidal structure for peer-to-peer networks. IET Commun. 2010, 4, 1-12.
-
(2010)
IET Commun.
, vol.4
, pp. 1-12
-
-
Liu, Y.1
Xiong, N.2
Park, J.3
Yang, C.4
Xu, K.5
-
54
-
-
67649871448
-
Fast Traffic Anomalies Detection Using SNMP MIB Correlation Analysis
-
Phoenix Park, Korea, 15-18 February
-
Lee, D.C.; Park, B.; Kim, K.E.; Lee, J.J. Fast Traffic Anomalies Detection Using SNMP MIB Correlation Analysis. In Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT'09), Phoenix Park, Korea, 15-18 February 2009; Volume 1, pp. 166-170.
-
(2009)
Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT'09)
, vol.1
, pp. 166-170
-
-
Lee, D.C.1
Park, B.2
Kim, K.E.3
Lee, J.J.4
-
55
-
-
70350627700
-
Volume Anomaly Detection in Data Networks:An Optimal Detection Algorithm vs. the PCA Approach
-
Valadas, R., Salvador, P., Eds, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
-
Casas, P.; Fillatre, L.; Vaton, S.; Nikiforov, I. Volume Anomaly Detection in Data Networks:An Optimal Detection Algorithm vs. the PCA Approach. In Traffic Management and Traffic Engineering for the Future Interne, Valadas, R., Salvador, P., Eds.; Volume 5464, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; pp 96-113.
-
(2009)
Traffic Management and Traffic Engineering for the Future Interne
, vol.5464
, pp. 96-113
-
-
Casas, P.1
Fillatre, L.2
Vaton, S.3
Nikiforov, I.4
-
56
-
-
84930322784
-
-
Available online, accessed on 16 April 2015
-
Plixer Scrutinizer-Incydent Response System. Available online: http://www.plixer.com (accessed on 16 April 2015).
-
-
-
-
57
-
-
84930320122
-
-
Available online, accessed on 16 April 2015
-
Peassler PRTG-Network Monitor. Available online: http://www.paessler.com (accessed on 16 April 2015).
-
-
-
-
58
-
-
84930341628
-
-
Available online, accessed on 16 April 2015
-
Solarwinds Network Traffic Analyzer. Available online: http://www.solarwinds.com (accessed on 16 April 2015).
-
-
-
-
59
-
-
84930346384
-
-
Available online, accessed on 16 April 2015
-
Invea-Tech FlowMon. Available online: https://www.invea.com (accessed on 16 April 2015).
-
-
-
-
60
-
-
84930364521
-
-
Available online, accessed on 16 April 2015
-
AKMA Labs FlowMatrix. Available online: http://www.akmalabs.com (accessed on 16 April 2015).
-
-
-
-
61
-
-
84919672677
-
ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
-
Jingle, I.; Rajsingh, E. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Human-centric Comput. Inf. Sci. 2014, 4, doi: 10.1186/s13673-014-0008-8.
-
(2014)
Human-centric Comput. Inf. Sci.
, vol.4
-
-
Jingle, I.1
Rajsingh, E.2
-
62
-
-
84901410507
-
Detection and defense of application-layer {DDoS} attacks in backbone web traffic
-
Zhou, W.; Jia, W.; Wen, S.; Xiang, Y.; Zhou, W. Detection and defense of application-layer {DDoS} attacks in backbone web traffic. Future Gener. Comput. Syst. 2014, 38, 36-46.
-
(2014)
Future Gener. Comput. Syst.
, vol.38
, pp. 36-46
-
-
Zhou, W.1
Jia, W.2
Wen, S.3
Xiang, Y.4
Zhou, W.5
-
63
-
-
34547464544
-
Impact of Packet Sampling on Anomaly Detection Metrics
-
Rio de Janeiro, Brazil, 25-27 October
-
Brauckhoff, D.; Tellenbach, B.;Wagner, A.; May, M.; Lakhina, A. Impact of Packet Sampling on Anomaly Detection Metrics. In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC '06, Rio de Janeiro, Brazil, 25-27 October 2006; pp 159-164.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC '06
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
64
-
-
33847290520
-
Mining Anomalies Using Traffic Feature Distributions
-
Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05), Philadelphia, PA, USA, 22-26 August
-
Lakhina, A.; Crovella, M.; Diot, C. Mining Anomalies Using Traffic Feature Distributions. In Proceedings of the 2005 Conference on Application, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05), Philadelphia, PA, USA, 22-26 August 2005; pp 217-228.
-
(2005)
Proceedings of the 2005 Conference on Application
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
65
-
-
84940644968
-
A Mathematical Theory of Communication
-
Shannon, C. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379-423.
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
66
-
-
82555177371
-
A Characterization of Entropy in Terms of Information Loss
-
Baez, J.C.; Fritz, T.; Leinster, T. A Characterization of Entropy in Terms of Information Loss. Entropy 2011, 13, 1945-1957.
-
(2011)
Entropy
, vol.13
, pp. 1945-1957
-
-
Baez, J.C.1
Fritz, T.2
Leinster, T.3
-
67
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Oakland, CA, USA, 14-16 May
-
Lee, W.; Xiang, D. Information-theoretic measures for anomaly detection. In Proceedings of 2001 IEEE Symposium on Security and Privac, Oakland, CA, USA, 14-16 May 2001; pp 130-143.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privac
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
69
-
-
79953753551
-
Entropy Measures vs
-
Teixeira, A.; Matos, A.; Souto, A.; Antunes, L. Entropy Measures vs. Kolmogorov Complexity. Entropy 2011, 13, 595-611.
-
(2011)
Kolmogorov Complexity. Entropy
, vol.13
, pp. 595-611
-
-
Teixeira, A.1
Matos, A.2
Souto, A.3
Antunes, L.4
-
70
-
-
34548301939
-
DoWitcher: Effective Worm Detection and Containment in the Internet Core
-
Anchorage, AL, USA, 6-12 May
-
Ranjan, S.; Shah, S.; Nucci, A.; Munafo, M.; Cruz, R.; Muthukrishnan, S. DoWitcher: Effective Worm Detection and Containment in the Internet Core. In Proceedings of 26th IEEE International Conference on Computer Communications (INFOCOM 2007, Anchorage, AL, USA, 6-12 May 2007; pp 2541-2545.
-
(2007)
Proceedings of 26th IEEE International Conference on Computer Communications (INFOCOM 2007
, pp. 2541-2545
-
-
Ranjan, S.1
Shah, S.2
Nucci, A.3
Munafo, M.4
Cruz, R.5
Muthukrishnan, S.6
-
71
-
-
84878701863
-
Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation
-
Berkeley, CA, USA, 19-21 October
-
Gu, Y.; McCallum, A.; Towsley, D. Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05, Berkeley, CA, USA, 19-21 October 2005; pp 32-32.
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05
, pp. 32-32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
72
-
-
50449088248
-
Detecting network events via T-entropy
-
Communications Signal Processing, Singapore, Singapore, 10-13 December 2007
-
Speidel, U.; Eimann, R.; Brownlee, N. Detecting network events via T-entropy. In Proceedings of 6th International Conference on Informatio, Communications Signal Processing, Singapore, Singapore, 10-13 December 2007 , 2007; pp 1-5.
-
(2007)
Proceedings of 6th International Conference on Informatio
, pp. 1-5
-
-
Speidel, U.1
Eimann, R.2
Brownlee, N.3
-
73
-
-
50449095490
-
A T-entropy Analysis of the Slammer Worm Outbreak
-
Okinawa, Japan, 27-30 September
-
Eimann, R.; Speidel, U.; Brownlee, J. A T-entropy Analysis of the Slammer Worm Outbreak. In Proceedings of Asia-Pacific Network Operations and Management Symposiu, Okinawa, Japan, 27-30 September 2005; pp 434-445.
-
(2005)
Proceedings of Asia-Pacific Network Operations and Management Symposiu
, pp. 434-445
-
-
Eimann, R.1
Speidel, U.2
Brownlee, J.3
-
74
-
-
24044469686
-
Deterministic Complexity and Entropy
-
Titchener, M.R.; Nicolescu, R.; Staiger, L.; Gulliver, T.A.; Speidel, U. Deterministic Complexity and Entropy. Fundam. Inform. 2005, 64, 443-461.
-
(2005)
Fundam. Inform.
, vol.64
, pp. 443-461
-
-
Titchener, M.R.1
Nicolescu, R.2
Staiger, L.3
Gulliver, T.A.4
Speidel, U.5
-
75
-
-
84930359646
-
Entropy Measures For Internet Traffic Anomaly Detection
-
Industry and Transport (TransComp), hlcity, country, date
-
Pawelec, J.; Bereziński, P.; Piotrowski, R.; Chamela, W. Entropy Measures For Internet Traffic Anomaly Detection. In Proceedings of 16th International Conference on Computer Systems Aided Science, Industry and Transport (TransComp), hlcity, country, date 2012; pp 309-318.
-
(2012)
Proceedings of 16th International Conference on Computer Systems Aided Science
, pp. 309-318
-
-
Pawelec, J.1
Bereziński, P.2
Piotrowski, R.3
Chamela, W.4
-
76
-
-
33646516485
-
Possible generalization of Boltzmann-Gibbs statistics
-
Tsallis, C. Possible generalization of Boltzmann-Gibbs statistics. J. Stat. Phys. 1988, 52, 479-487.
-
(1988)
J. Stat. Phys.
, vol.52
, pp. 479-487
-
-
Tsallis, C.1
-
77
-
-
82655173397
-
The Nonadditive Entropy Sq and Its Applications in Physics and Elsewhere: Some Remarks
-
Tsallis, C. The Nonadditive Entropy Sq and Its Applications in Physics and Elsewhere: Some Remarks. Entropy 2011, 13, 1765-1804.
-
(2011)
Entropy
, vol.13
, pp. 1765-1804
-
-
Tsallis, C.1
-
78
-
-
84860673981
-
Tsallis Relative Entropy and Anomalous Diffusion
-
Prehl, J.; Essex, C.; Hoffmann, K.H. Tsallis Relative Entropy and Anomalous Diffusion. Entropy 2012, 14, 701-716.
-
(2012)
Entropy
, vol.14
, pp. 701-716
-
-
Prehl, J.1
Essex, C.2
Hoffmann, K.H.3
-
80
-
-
54749100076
-
Axiomatic Characterizations of Information Measures
-
Csiszár, I. Axiomatic Characterizations of Information Measures. Entropy 2008, 10, 261-273.
-
(2008)
Entropy
, vol.10
, pp. 261-273
-
-
Csiszár, I.1
-
81
-
-
38149086666
-
Network anomaly detection using nonextensive entropy
-
Ziviani, A.; Gomes, A.; Monsores, M.; Rodrigues, P. Network anomaly detection using nonextensive entropy. IEEE Commun. Lett. 2007, 11, 1034-1036.
-
(2007)
IEEE Commun. Lett.
, vol.11
, pp. 1034-1036
-
-
Ziviani, A.1
Gomes, A.2
Monsores, M.3
Rodrigues, P.4
-
82
-
-
57349177607
-
Improving Accuracy of Immune-inspired Malware Detectors by Using Intelligent Features
-
Atlanta, GA, USA, 12-16 July
-
Shafiq, M.Z.; Khayam, S.A.; Farooq, M. Improving Accuracy of Immune-inspired Malware Detectors by Using Intelligent Features. In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO '08, Atlanta, GA, USA, 12-16 July 2008; pp 119-126.
-
(2008)
Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation (GECCO '08
, pp. 119-126
-
-
Shafiq, M.Z.1
Khayam, S.A.2
Farooq, M.3
-
83
-
-
84865039159
-
A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection
-
Natal, Brazil, 29-31 August
-
Lima, C.F.L.; de Assis, F.M.; de Souza, C.P. A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection. In Proceedings of the 13th Intl Conf. on Intelligent Data Engineering and Automated Learning (IDEAL'12, Natal, Brazil, 29-31 August 2012; pp 492-501.
-
(2012)
Proceedings of the 13th Intl Conf. on Intelligent Data Engineering and Automated Learning (IDEAL'12
, pp. 492-501
-
-
Lima, C.F.L.1
de Assis, F.M.2
de Souza, C.P.3
-
84
-
-
80052448813
-
Accurate Network Anomaly Classification with Generalized Entropy Metrics
-
Tellenbach, B.; Burkhart, M.; Schatzmann, D.; Gugelmann, D.; Sornette, D. Accurate Network Anomaly Classification with Generalized Entropy Metrics. Comput. Netw. 2011, 55, 3485-3502.
-
(2011)
Comput. Netw.
, vol.55
, pp. 3485-3502
-
-
Tellenbach, B.1
Burkhart, M.2
Schatzmann, D.3
Gugelmann, D.4
Sornette, D.5
-
85
-
-
85027945620
-
Robust Network Traffic Classification
-
Zhang, J.; Chen, X.; Xiang, Y.; Zhou, W.; Wu, J. Robust Network Traffic Classification. IEEE/ACM Trans. Netw. 2014, PP, 1-1.
-
(2014)
IEEE/ACM Trans. Netw.
, pp. 1-1
-
-
Zhang, J.1
Chen, X.2
Xiang, Y.3
Zhou, W.4
Wu, J.5
-
88
-
-
0001549935
-
Maximum Entropy Fundamentals
-
Harremoes, P.; Topsoe, F. Maximum Entropy Fundamentals. Entropy 2001, 3, 191-226.
-
(2001)
Entropy
, vol.3
, pp. 191-226
-
-
Harremoes, P.1
Topsoe, F.2
-
91
-
-
48249143738
-
Comparison of Shannon, Renyi and Tsallis Entropy Used in Decision Trees
-
Rutkowski, L., Tadeusiewicz, R., Zadeh, L., Zurada, J., Eds.;, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
-
Maszczyk, T.; Duch, W. Comparison of Shannon, Renyi and Tsallis Entropy Used in Decision Trees. In Artificial Intelligence and Soft Computing-ICAISC 200, Rutkowski, L., Tadeusiewicz, R., Zadeh, L., Zurada, J., Eds.; Volume 5097, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; pp 643-651.
-
(2008)
Artificial Intelligence and Soft Computing-ICAISC 200
, vol.5097
, pp. 643-651
-
-
Maszczyk, T.1
Duch, W.2
-
92
-
-
16844386674
-
A step beyond Tsallis and Rényi entropies
-
Marco, M. A step beyond Tsallis and Rényi entropies. Phys. Lett. A 2005, 338, 217-224.
-
(2005)
Phys. Lett. A
, vol.338
, pp. 217-224
-
-
Marco, M.1
-
94
-
-
84930356580
-
-
Available online, accessed on 16 April 2015
-
Softflowd-Flow-based Network Traffic Analyser. Available online: http://code.google.com/p/ softflowd/(accessed on 16 April 2015).
-
-
-
-
95
-
-
84930364647
-
-
White Paper. Available online, accessed on 16 April 2015
-
Gigamon-SPAN Port Or TAP? White Paper. Available online: https://www.netdescribe.com/ downloads/span_port_or_tap_web.pdf (accessed on 16 April 2015).
-
-
-
-
97
-
-
18144411417
-
Background and threshold: critical comparison of methods of determination
-
Reimann, C.; Filzmoser, P.; Garrett, R.G. Background and threshold: critical comparison of methods of determination. Sci. Total Environ. 2005, 346, 1-16.
-
(2005)
Sci. Total Environ.
, vol.346
, pp. 1-16
-
-
Reimann, C.1
Filzmoser, P.2
Garrett, R.G.3
-
98
-
-
84885213555
-
Telecommunications Networks Risk Assessment with Bayesian Networks
-
Saeed, K., Chaki, R., Cortesi, A.,Wierzchoń, S., Eds., Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
-
Szpyrka, M.; Jasiul, B.; Wrona, K.; Dziedzic, F. Telecommunications Networks Risk Assessment with Bayesian Networks. In Computer Information Systems and Industrial Managemen, Saeed, K., Chaki, R., Cortesi, A.,Wierzchoń, S., Eds.; Volume 8104, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; pp 277-288.
-
(2013)
Computer Information Systems and Industrial Managemen
, vol.8104
, pp. 277-288
-
-
Szpyrka, M.1
Jasiul, B.2
Wrona, K.3
Dziedzic, F.4
-
99
-
-
76749092270
-
The WEKA Data Mining Software: An Update
-
Hall, M.; Frank, E.; Holmes, G.; Pfahringer, B.; Reutemann, P.; Witten, I. The WEKA Data Mining Software: An Update. SIGKDD Explor. Newslett. 2009, 11, 10-18.
-
(2009)
SIGKDD Explor. Newslett.
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.6
-
100
-
-
84920889921
-
Detection and Modeling of Cyber Attacks with Petri Nets
-
Jasiul, B.; Szpyrka, M.; Śliwa, J. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602-6623.
-
(2014)
Entropy
, vol.16
, pp. 6602-6623
-
-
Jasiul, B.1
Szpyrka, M.2
Śliwa, J.3
-
101
-
-
84910603192
-
Malware Behavior Modeling with Colored Petri Nets
-
Saeed, K., Snasel, V., Eds.;, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
-
Jasiul, B.; Szpyrka, M.; Śliwa, J. Malware Behavior Modeling with Colored Petri Nets. In Computer Information Systems and Industrial Managemen, Saeed, K., Snasel, V., Eds.; Volume 8838, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; pp 667-679.
-
(2014)
Computer Information Systems and Industrial Managemen
, vol.8838
, pp. 667-679
-
-
Jasiul, B.1
Szpyrka, M.2
Śliwa, J.3
-
102
-
-
84915820213
-
Formal Specification of Malware Models in the Form of Colored Petri Nets
-
Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G., Eds.;, Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany
-
Jasiul, B.; Szpyrka, M.; Śliwa, J. Formal Specification of Malware Models in the Form of Colored Petri Nets. In Computer Science and its Application, Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G., Eds.; Volume 330, Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany, 2015; pp 475-482.
-
(2015)
Computer Science and its Application
, vol.330
, pp. 475-482
-
-
Jasiul, B.1
Szpyrka, M.2
Śliwa, J.3
-
103
-
-
84930339539
-
-
Available online, accessed on 16 April 2015
-
ACM Sigcomm Internet Traffic Archive. Available online: http://www.sigcomm.org/ITA (accessed on 16 April 2015).
-
-
-
-
104
-
-
84930353480
-
-
Available online, accessed on 16 April 2015
-
Lawrence Berkeley National Laboratory/International Computer Science Institute Enterprise Tracing. Available online: http://www.icir.org/enterprise-tracing/ (accessed on 16 April 2015).
-
-
-
-
105
-
-
84930317555
-
-
Available online, accessed on 16 April 2015
-
SimpleWeb. Available online: http://www.simpleweb.org/wiki/Traces (accessed on 16 April 2015).
-
-
-
-
106
-
-
84930334574
-
-
Available online, accessed on 16 April 2015
-
Center for Applied Internet Data Analysis (CAIDA). Available online: http://www.caida.org/ data/overview (accessed on 16 April 2015).
-
-
-
-
107
-
-
84930328270
-
-
Available online, accessed on 16 April 2015
-
Cluster of European Projects aimed at Monitoring and Measurement (MoMe). Available online:http://www.ist-mome.org/database/MeasurementData (accessed on 16 April 2015).
-
-
-
-
108
-
-
84930330751
-
-
Available online, accessed on 16 April 2015
-
Waikato Internet Traffic Storage (WITS). Available online: http://wand.net.nz/wits (accessed on 16 April 2015).
-
-
-
-
109
-
-
84930320032
-
-
Available online, accessed on 16 April 2015
-
UMass Trace Repository (UMass). Available online: http://traces.cs.umass.edu (accessed on 16 April 2015).
-
-
-
-
110
-
-
84930341737
-
-
Available online, accessed on 16 April 2015
-
Verizon Data Breach Investigations Report. Available online: http://www.verizonenterprise.com/ DBIR/2014/(accessed on 16 April 2015).
-
-
-
-
111
-
-
84930368413
-
-
Available online, accessed on 16 April 2015
-
Symantec Internet Security Threat Report. Available online: http://www.symantec.com/security_ response/publications/threatreport.jsp (accessed on 16 April 2015).
-
-
-
-
112
-
-
84930354194
-
-
Availableonline:, accessed on 16 April 2015
-
CERT Poland Raport. Availableonline:http://www.cert.pl/PDF/Report_CP_2013.pdf (accessed on 16 April 2015).
-
-
-
-
113
-
-
80052095850
-
Detecting P2P botnets through network behavior analysis and machine learning
-
Security and Trust (PST), Montreal, QC, Canada, 19-21 July
-
Saad, S.; Traore, I.; Ghorbani, A.A.; Sayed, B.; Zhao, D.; Lu, W.; Felix, J.; Hakimian, P. Detecting P2P botnets through network behavior analysis and machine learning. In Proceedings of 2011 Ninth Annual International Conference on Privac, Security and Trust (PST), Montreal, QC, Canada, 19-21 July 2011; pp 174-180.
-
(2011)
Proceedings of 2011 Ninth Annual International Conference on Privac
, pp. 174-180
-
-
Saad, S.1
Traore, I.2
Ghorbani, A.A.3
Sayed, B.4
Zhao, D.5
Lu, W.6
Felix, J.7
Hakimian, P.8
-
114
-
-
84903157026
-
An Empirical Comparison of Botnet Detection Methods
-
García, S.; Grill, M.; Stiborek, J.; Zunino, A. An Empirical Comparison of Botnet Detection Methods. Comput. Secur. 2014, 45, 100-123.
-
(2014)
Comput. Secur.
, vol.45
, pp. 100-123
-
-
García, S.1
Grill, M.2
Stiborek, J.3
Zunino, A.4
-
115
-
-
77049103625
-
A Labeled Data Set for Flow-Based Intrusion Detection
-
Springer: Berlin/Heidelberg, Germany
-
Sperotto, A.; Sadre, R.; Vliet, F.; Pras, A. A Labeled Data Set for Flow-Based Intrusion Detection. In Proceedings of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09), Venice, Italy, 29-30 October 2009, Springer: Berlin/Heidelberg, Germany, 2009; pp 39-50.
-
(2009)
Proceedings of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09), Venice, Italy, 29-30 October 2009
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Vliet, F.3
Pras, A.4
-
116
-
-
84910593766
-
Entropy-Based Internet Traffic Anomaly Detection: A Case Study
-
Zamojski,W., Mazurkiewicz, J., Sugier, J.,Walkowiak, T., Kacprzyk, J., Eds.;, Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland
-
Bereziński, P.; Pawelec, J.; Małowidzki, M.; Piotrowski, R. Entropy-Based Internet Traffic Anomaly Detection: A Case Study. In Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, Brunów, Poland, 30 June - 4 July 201, Zamojski,W., Mazurkiewicz, J., Sugier, J.,Walkowiak, T., Kacprzyk, J., Eds.; Volume 286, Advances in Intelligent Systems and Computing; Springer: Cham, Switzerland, 2014; pp 47-58.
-
(2014)
Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, Brunów, Poland, 30 June - 4 July 201
, vol.286
, pp. 47-58
-
-
Bereziński, P.1
Pawelec, J.2
Małowidzki, M.3
Piotrowski, R.4
-
117
-
-
33644961664
-
-
Technical Report 1062; MIT Lincoln Laboratory: Lexington, MA, USA, Available online, accessed on 16 April 2015
-
Haines, J.; Lippmann, R.; Fried, D.; Zissman, M.; Tran, E.; Boswell, S. 1999 DARPA Intrusion Detection Evaluation: Design and Procedures; Technical Report 1062; MIT Lincoln Laboratory: Lexington, MA, USA, 2001; Available online:https://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/files/TR-1062.pdf, (accessed on 16 April 2015).
-
(2001)
1999 DARPA Intrusion Detection Evaluation: Design and Procedures
-
-
Haines, J.1
Lippmann, R.2
Fried, D.3
Zissman, M.4
Tran, E.5
Boswell, S.6
-
118
-
-
84930327267
-
-
Available online, accessed on 16 April 2015
-
The Third International Knowledge Discovery and Data Mining Tools (KDD) Cup 1999 Data. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 16 April 2015).
-
Cup 1999 Data
-
-
-
119
-
-
77950575061
-
A Detailed Analysis of the KDD CUP 99 Data Set
-
Ottawa, ON, Canada, 8-10 July
-
Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A Detailed Analysis of the KDD CUP 99 Data Set. In Proceedings of the 2nd IEEE Intl Conference on Computational Intelligence for Security and Defense Application, Ottawa, ON, Canada, 8-10 July 2009; pp 53-58.
-
(2009)
Proceedings of the 2nd IEEE Intl Conference on Computational Intelligence for Security and Defense Application
, pp. 53-58
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
120
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations As Performed by Lincoln Laboratory
-
McHugh, J. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations As Performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 2000, 3, 262-294.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
121
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
Vigna, G.; Kruegel, C., Jonsson, E., Eds, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany
-
Mahoney, M.V.; Chan, P.K. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Recent Advances in Intrusion Detectio, Vigna, G.; Kruegel, C., Jonsson, E., Eds.; Volume 2820, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany, 2003; pp 220-237.
-
(2003)
Recent Advances in Intrusion Detectio
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
122
-
-
43249094048
-
Usefulness of DARPA dataset for intrusion detection system evaluation
-
Thomas, C.; Sharma, V.; Balakrishnan, N. Usefulness of DARPA dataset for intrusion detection system evaluation. SPIE Proc. 2008, doi:10.1117/12.777341.
-
(2008)
SPIE Proc.
-
-
Thomas, C.1
Sharma, V.2
Balakrishnan, N.3
-
123
-
-
85084160250
-
FLAME: A Flow-level Anomaly Modeling Engine
-
San Jose, CA, USA, 28 July
-
Brauckhoff, D.; Wagner, A.; May, M. FLAME: A Flow-level Anomaly Modeling Engine. In Proceedings of the Conference on Cyber Security Experimentation and Test (CSET'08), San Jose, CA, USA, 28 July 2008; pp 1-6.
-
(2008)
Proceedings of the Conference on Cyber Security Experimentation and Test (CSET'08)
, pp. 1-6
-
-
Brauckhoff, D.1
Wagner, A.2
May, M.3
-
125
-
-
84859430323
-
Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection
-
Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection. Comput. Secur. 2012, 31, 357-374.
-
(2012)
Comput. Secur.
, vol.31
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.A.4
-
126
-
-
84910631483
-
Network Anomaly Detection Using Parameterized Entropy
-
Saeed, K., Snasel, V., Eds.;, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany
-
Bereziński, P.; Szpyrka, M.; Jasiul, B.; Mazur, M. Network Anomaly Detection Using Parameterized Entropy. In Computer Information Systems and Industrial Managemen, Saeed, K., Snasel, V., Eds.; Volume 8838, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany, 2014; pp 465-478.
-
(2014)
Computer Information Systems and Industrial Managemen
, vol.8838
, pp. 465-478
-
-
Bereziński, P.1
Szpyrka, M.2
Jasiul, B.3
Mazur, M.4
-
127
-
-
84930352083
-
-
Available online, accessed on 16 April 2015
-
Tomer, B. Morto Post Mortem: Dissecting a Worm; Available online: http://blog.imperva.com/2011/09/morto-post-mortem-a-worm-deep-dive.html (accessed on 16 April 2015).
-
Morto Post Mortem: Dissecting a Worm
-
-
Tomer, B.1
-
128
-
-
84870481764
-
Hands-on Denial of Service Lab Exercises Using SlowLoris and RUDY
-
(InfoSecCD '12, Kennesaw, GA, USA, 12-13 October
-
Damon, E.; Dale, J.; Laron, E.; Mache, J.; Land, N.; Weiss, R. Hands-on Denial of Service Lab Exercises Using SlowLoris and RUDY. In Proceedings of the 2012 Information Security Curriculum Development Conference, (InfoSecCD '12, Kennesaw, GA, USA, 12-13 October 2012; pp 21-29.
-
(2012)
Proceedings of the 2012 Information Security Curriculum Development Conference
, pp. 21-29
-
-
Damon, E.1
Dale, J.2
Laron, E.3
Mache, J.4
Land, N.5
Weiss, R.6
-
129
-
-
84894191142
-
The Cousins of Stuxnet: Duqu, Flame, and Gauss
-
Bencsáth, B.; Pék, G.; Buttyán, L.; Félegyházi, M. The Cousins of Stuxnet: Duqu, Flame, and Gauss. Future Internet 2012, 4, 971-1003.
-
(2012)
Future Internet
, vol.4
, pp. 971-1003
-
-
Bencsáth, B.1
Pék, G.2
Buttyán, L.3
Félegyházi, M.4
-
131
-
-
85055954491
-
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
-
San Diego, CA, USA, 20-22 August
-
Kührer, M.; Hupperich, T.; Rossow, C.; Holz, T. Exit from Hell? Reducing the Impact of Amplification DDoS Attacks. In Proceedings of the 23rd USENIX Security Symposiu, San Diego, CA, USA, 20-22 August 2014.
-
(2014)
Proceedings of the 23rd USENIX Security Symposiu
-
-
Kührer, M.1
Hupperich, T.2
Rossow, C.3
Holz, T.4
-
132
-
-
79959852979
-
Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data
-
Hauke, J.; Kossowski, T. Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data. Quaest. Geogr. 2011, 30, 87-93.
-
(2011)
Quaest. Geogr.
, vol.30
, pp. 87-93
-
-
Hauke, J.1
Kossowski, T.2
-
133
-
-
33749249600
-
The Relationship Between Precision-Recall and ROC Curves
-
(ICML'06, Pittsburgh, PA, USA, 25-29 June
-
Davis, J.; Goadrich, M. The Relationship Between Precision-Recall and ROC Curves. In Proceedings of the 23rd International Conference on Machine Learning, (ICML'06, Pittsburgh, PA, USA, 25-29 June 2006; pp 233-240.
-
(2006)
Proceedings of the 23rd International Conference on Machine Learning
, pp. 233-240
-
-
Davis, J.1
Goadrich, M.2
-
134
-
-
84895868005
-
Classification of Knee Joint Vibration Signals Using Bivariate Feature Distribution Estimation and Maximal Posterior Probability Decision Criterion
-
Wu, Y.; Cai, S.; Yang, S.; Zheng, F.; Xiang, N. Classification of Knee Joint Vibration Signals Using Bivariate Feature Distribution Estimation and Maximal Posterior Probability Decision Criterion. Entropy 2013, 15, 1375-1387.
-
(2013)
Entropy
, vol.15
, pp. 1375-1387
-
-
Wu, Y.1
Cai, S.2
Yang, S.3
Zheng, F.4
Xiang, N.5
-
135
-
-
84930339737
-
-
Available online, accessed on 16 April 2015
-
Rifkin, R. MIT-Multiclass Classification. Available online: http://www.mit.edu/~9.520/ spring09/Classes/multiclass.pdf (accessed on 16 April 2015).
-
MIT-Multiclass Classification
-
-
Rifkin, R.1
-
136
-
-
33646420865
-
Speeding up Logistic Model Tree Induction
-
Porto, Portugal, 3-7 October
-
Sumner, M.; Frank, E.; Hall, M. Speeding up Logistic Model Tree Induction. In Proceedings of 9th European Conference on Principles and Practice of Knowledge Discovery in Database, Porto, Portugal, 3-7 October 2005; pp 675-683.
-
(2005)
Proceedings of 9th European Conference on Principles and Practice of Knowledge Discovery in Database
, pp. 675-683
-
-
Sumner, M.1
Frank, E.2
Hall, M.3
-
137
-
-
0003737234
-
-
Wiley Series in Probability and Statistics; Wiley:Hoboken, NJ, USA
-
Seber, G.; Lee, A. Linear Regression Analysis; Wiley Series in Probability and Statistics; Wiley:Hoboken, NJ, USA, 2012.
-
(2012)
Linear Regression Analysis
-
-
Seber, G.1
Lee, A.2
-
138
-
-
21244500957
-
Logistic Model Trees
-
Landwehr, N.; Hall, M.; Frank, E. Logistic Model Trees. Mach. Learn. 2005, 59, 161-205.
-
(2005)
Mach. Learn.
, vol.59
, pp. 161-205
-
-
Landwehr, N.1
Hall, M.2
Frank, E.3
-
139
-
-
84861617363
-
An Extensive Experimental Comparison of Methods for Multi-label Learning
-
Madjarov, G.; Kocev, D.; Gjorgjevikj, D.; Deroski, S. An Extensive Experimental Comparison of Methods for Multi-label Learning. Pattern Recogn. 2012, 45, 3084-3104.
-
(2012)
Pattern Recogn.
, vol.45
, pp. 3084-3104
-
-
Madjarov, G.1
Kocev, D.2
Gjorgjevikj, D.3
Deroski, S.4
-
140
-
-
84930323816
-
-
Available online, accessed on 16 April 2015
-
MEKA: A Multi-label Extension to WEKA. Available online: http://meka.sourceforge.net/ (accessed on 16 April 2015).
-
A Multi-label Extension to WEKA
-
-
|