Information Technology Reference
In-Depth Information
5. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In IEEE
Symposium on Security and Privacy, Oakland, CA. SRI International (1991)
6. Axelsson, S.: Research in intrusion-detection systems: A survey. Technical report
TR 98-17, Gteborg, Sweden: Department of Computer Engineering, Chalmers Uni-
versity of Technology (1999)
7. Hofmeyr, S.A., Somayaji, A., Forrest, S.: Intrusion Detection using Sequences of
System Calls. Journal of Computer Security Vol. 6 (1998)
8. Fox, K.L., Henning, R.R., Reed, J.H., Simonian, R.P.: A neural network approach
towards intrusion detection. Proceedings of 13th National Computer Security Con-
ference, NIST, Baltimore, MD (1999) 125-134
9. Barbara, D., Couto, J., Jajodia, S., Wu, N.: ADAM: A testbed for exploring the
use of data mining in intrusion detection, ACM SIGMOD Record, 30 (4) (2001)
10. Barbara, D., Couto, J., Jajodia, S., Wu, N.: An architecture for anomaly detec-
tion. D. Barbara and S. Jajodia (Eds.), Applications of Data Mining in Computer
Security, Boston: Kluwer Academic (2002) 63-76
11. Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. Proc. of the
7th USENIX Secunity Symposium (1998)
12. Lee, W., Stolfo, S.: A Data Mining Framework for Building Intrusion Detection
Models, IEEE Symposium on Security and Privacy (1999)
13. Barbara, D., Couto, J., Wu, N.: ADAM: Detecting Intrusion by Data Mining. Proc.
of the 2th IEEE Information Assurance Workshop (2001)
14. Teng, H., Chen, K., Lu, S.: Adaptive Real-Time Anomaly Detection Using Induc-
tively Generated Sequential Patterns, Proceedings, IEEE Symposium on Research
in Computer Security and Privacy (1990)
15. Kim, J.S., Lee, H.G., Seo, S., Ryu, K.H.: CTAR: Classification Based on Temporal
Class-Association Rules for Intrusion Detection, WISA 2003, Lecture Notes in
Computer Science Publisher: Springer-Verlag, Vol 2908/2003 (2003) 84-96
16. Lee, W.: A Data Mining Framework for Constructing Features and Models
for Intrusion Detection Systems, Ph.D. Thesis, Computer Science Department,
Columbia University, New York, NY. June (1999)
17. DARPA data set:
www.ll.mit.edu/IST/ideval/data/1998/1998 data index.html
18. Agrawal, R., Imielinski, T., Swami, V.: Mining association rules between sets of
items in large databases. P. Buneman and S. Jajodia, editors, Proceedings of the
ACM SIGMOD Int. Conf. on Management of Data, Washington, D.C. (1993) 207-
216
19. Lippmann, R.P.: Evaluating Intrusion Detection Systems: the 1998 DARPA Off-
Line Intrusion Detection Evaluation. Proceedings of the 2000 DARPA Information
Survivability Conference and Exposition, Vol. 2
Search WWH ::




Custom Search