-
2
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An overview of ip flow-based intrusion detection," IEEE Communications Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
5
-
-
84867976535
-
Unknown attacks detection using feature extraction from anomaly-based ids alerts
-
M. Sato, H. Yamaki, and H. Takakura, "Unknown attacks detection using feature extraction from anomaly-based ids alerts," in Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT), 2012, pp. pp. 273-277.
-
(2012)
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT)
, pp. 273-277
-
-
Sato, M.1
Yamaki, H.2
Takakura, H.3
-
7
-
-
84893245118
-
Flow-Based anomaly detection using neural network optimized with gsa algorithm
-
Z. Jadidi, V. Muthukkumarasamy, E. Sithirasenan, and M. Sheikhan, "Flow-based anomaly detection using neural network optimized with gsa algorithm," in Proceedings of 33rd IEEE International Conference on Distributed Computing Systems Workshops, 2013, pp. 76-81.
-
(2013)
Proceedings of 33rd IEEE International Conference on Distributed Computing Systems Workshops
, pp. 76-81
-
-
Jadidi, Z.1
Muthukkumarasamy, V.2
Sithirasenan, E.3
Sheikhan, M.4
-
8
-
-
79952826624
-
Inductive intrusion detection in flow-based network data using one-class support vector machines
-
P. Winter, E. Hermann, and M. Zeilinger, "Inductive intrusion detection in flow-based network data using one-class support vector machines," in Proceedings of 4th International Conference on New Technologies, Mobility and Security (NTMS), 2011, pp. 1-5.
-
(2011)
Proceedings of 4th International Conference on New Technologies, Mobility and Security (NTMS)
, pp. 1-5
-
-
Winter, P.1
Hermann, E.2
Zeilinger, M.3
-
9
-
-
84876051615
-
Growing hierarchical self-organizing maps and statistical distribution models for online detection of web attacks
-
Springer
-
M. Zolotukhin, T. Hämälaïnen, and A. Juvonen, "Growing hierarchical self-organizing maps and statistical distribution models for online detection of web attacks," Springer. Web Information Systems and Technologies. Lecture Notes in Business Information Processing, vol. 140, pp. 281-295, 2013.
-
(2013)
Web Information Systems and Technologies. Lecture Notes in Business Information Processing
, vol.140
, pp. 281-295
-
-
Zolotukhin, M.1
Hämälaïnen, T.2
Juvonen, A.3
-
11
-
-
50049109832
-
Flow anomaly detection in firewalled networks
-
M. Chapple, T. Wright, and R. Winding, "Flow anomaly detection in firewalled networks," in Proceedings of Securecomm and Workshops, 2006, pp. 1-6.
-
(2006)
Proceedings of Securecomm and Workshops
, pp. 1-6
-
-
Chapple, M.1
Wright, T.2
Winding, R.3
-
12
-
-
84894455825
-
Towards realtime intrusion detection for netflow and ipfix
-
R. Hofstede, V. Bartos, A. Sperotto, and A. Pras, "Towards realtime intrusion detection for netflow and ipfix," in Proceedings of the 9th International Conference on Network and Service Management (CNSM), 2013, pp. 227-234.
-
(2013)
Proceedings of the 9th International Conference on Network and Service Management (CNSM)
, pp. 227-234
-
-
Hofstede, R.1
Bartos, V.2
Sperotto, A.3
Pras, A.4
-
13
-
-
77951151839
-
A flow based anomaly detection system using chi-square technique
-
N. Muraleedharan, A. Parmar, and M. Kumar, "A flow based anomaly detection system using chi-square technique," in Proceedings of the 2nd IEEE International Advance Computing Conference, 2010, pp. 285-289.
-
(2010)
Proceedings of the 2nd IEEE International Advance Computing Conference
, pp. 285-289
-
-
Muraleedharan, N.1
Parmar, A.2
Kumar, M.3
-
14
-
-
84904103233
-
A novel anomaly detection system based on seven-dimensional flow analysis
-
M. de Assis, J. Rodrigues, and M. L. P. Junior, "A novel anomaly detection system based on seven-dimensional flow analysis," in Proceedings of IEEE Global Communications Conference (GLOBECOM), 2013, pp. 735-740.
-
(2013)
Proceedings of IEEE Global Communications Conference (GLOBECOM)
, pp. 735-740
-
-
De Assis, M.1
Rodrigues, J.2
Junior, M.L.P.3
-
15
-
-
84989873864
-
An anomaly detection method based on fuzzy c-means clustering algorithm
-
L. Xie, Y. Wang, L. Chen, and G. Yue, "An anomaly detection method based on fuzzy c-means clustering algorithm," in Proceedings of the 2nd Int. Symp. on Networking and Network Security, 2010, pp. 89-92.
-
(2010)
Proceedings of the 2nd Int. Symp. on Networking and Network Security
, pp. 89-92
-
-
Xie, L.1
Wang, Y.2
Chen, L.3
Yue, G.4
-
17
-
-
84977882347
-
Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers
-
A. M. Chandrasekhar and K. Raghuveer, "Intrusion detection technique by using k-means, fuzzy neural network and svm classifiers," in Proceedings of IEEE International Conference on Networking, Sensing and Control, 2013, pp. 1-7.
-
(2013)
Proceedings of IEEE International Conference on Networking, Sensing and Control
, pp. 1-7
-
-
Chandrasekhar, A.M.1
Raghuveer, K.2
-
19
-
-
0032269108
-
How many clusters? Which clustering method? Answers via model-based cluster analysi
-
C. Fraley and A. Raftery, "How many clusters? which clustering method? answers via model-based cluster analysi," The Computer Journal, vol. 41, pp. 578-588, 1998.
-
(1998)
The Computer Journal
, vol.41
, pp. 578-588
-
-
Fraley, C.1
Raftery, A.2
-
20
-
-
84927596089
-
A survey of hierarchical clustering algorithms
-
M. Rafsanjani, Z. Varzaneh, and N. Chukanlo, "A survey of hierarchical clustering algorithms," The Journal of Mathematics and Computer Science, vol. 5, no. 3, pp. 229-240, 2012.
-
(2012)
The Journal of Mathematics and Computer Science
, vol.5
, Issue.3
, pp. 229-240
-
-
Rafsanjani, M.1
Varzaneh, Z.2
Chukanlo, N.3
-
21
-
-
84960888311
-
-
Jyvsectec-rgce-homepage
-
"Jyvsectec-rgce-homepage," http://www.jyvsectec.fi/en/rgce/.
-
-
-
-
22
-
-
84916211158
-
Analysis of http requests for anomaly detection of web attacks
-
M. Zolotukhin, T. Hämälaïnen, T. Kokkonen, and J. Siltanen, "Analysis of http requests for anomaly detection of web attacks," in Proceedings of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2014, pp. 406-411.
-
(2014)
Proceedings of the 12th IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 406-411
-
-
Zolotukhin, M.1
Hämälaïnen, T.2
Kokkonen, T.3
Siltanen, J.4
-
23
-
-
84960886801
-
-
Ministry of defence press release 8.5.2013, kyberturvallisuusharjoitus jyväskylässä 13.-17.5.2013
-
"Ministry of defence press release 8.5.2013, kyberturvallisuusharjoitus jyväskylässä 13.-17.5.2013," http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus jyvaskylassa 13.-17.5.2013.5502.news, 2013.
-
(2013)
-
-
|