A comparative study of anomaly detection schemes in network intrusion detection.
b9928e0c57d7fdc9212d412d47a979bfa6ae04da6fed4884e9c6313b71e3f0c1
A Data Mining Framework for Building Intrusion Detection Models.
60d04b31fcfe448027bbb5860b8344475e331292a2f38a9c58a5f6bf8565794d
A Framework For An Adaptive Intrusion Detection System with Data Mining.
8f6eb99f5161f3bdc97f1b2abc1790661385fcd2a732370cb3a64ad0d76ff3b4
A Framework for Classifying Denial of Service Attacks.
6bb2ae1d0f82b729c5207119d92f40b2d239e203a10af9bec1f54258ede9691e
A Framework for Constructing Features and Models for Intrusion Detection Systems.
f61527cf4af2510db8ad35437d3eb26e96999237907e12a510de0e49b2733a31
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.
0449a5f802f6d128eb3b915c406f89489a0cd361eccb64aa70000c137ec98639
A Learning Based Approach to the Detection of SQL Attacks.
fb14d0903dcb142210d09d168d0e7272d143fb9ec59f4aea8414793dabf2f3d3
A Multimodel Approach to the Detection of Web-based Attacks.
9117f01a49f372f1077722bd13c30ab099dadef91785ce47ff698440299999b1
ADAM: Detecting Intrusions by Data Mining.
365871b2726492c541c1128a5b7aa28e3b8f49a1efca1a45ea31c32a99328740
Adaptive ModelBased Monitoring and Threat Detection.
ffb2ace3c126a841b0995e6762b65668e80fa180369921ba297bf8a07215995c
Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.
172077357cd30fcc62e04169f1ec84f6a94d98bf29814df319b1c50ade80699a
An Analysis of 1999 DARPA for Network Anomaly Detection.
d4666f6ffd4ce7a95bacc505648efa236a6525bb48d04ed5b62be09a89deaf2b
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.
b8315ea07cf451e421585c010d3d279254f025a76e8535e1570373c64d43931c
Artificial Neural Networks for Misuse Detection.
453df9e792073f3916624b46fe6e9046520fa730ae9f4f767c0dd6fc2b1dbba3
Anomalous Payloadbased Network Intrusion Detection.
9c25b1fec06554bffaf334517971c4cb2970439182656787fe2c7be234ba7537
Anomalous Payloadbased Worm Detection and Signature Generation.
1a316e80a29f60a55607e500d38fbace3e0c8aa7b2006af81a622cbbe5f4d5c0
Anomaly Detection of Webbased Attacks.
c369809658f5a0f07f13ac5ff735d08a77fc9ec3cf8423f28b77e5130f59be51
Application of Artiticial Neural Network to Misuse Detection: Initial Results.
ad265ece6bdbe90f06722c37a8c536e35747fae08fb3245b7017a1639611694e
Audit Data Reduction for Intrusion Detection.
b35c688d5912ca6b3d789328c4e4a6e187a7d8c3ef95b11e1529030e8287538d
Autograph: Toward Automated, Distributed Worm Signature Detection.
0cb4a3046f7bf52bd0b79c0cbfe693b088d13cc12fc0289d06e30e18c8114e8c
Bayesian Event Classification for Intrusion Detection.
ad80f2bb538c68b96ee709af75a70a2fae32e56977d7f19e998361089e52922d
Bro: A System for Detecting Network Intruders in RealTime.
a6a812761c18136a77155455be3a7647d70dec890681e1d874f2143672587d31
Characteristics of Network Flow Anomalies.
2af73f0d81a7be88804e65be8fc333406c2fbbd53f394f35f29fe3432578771f
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs.
d1e793eb894a058b611199b27ae1fdafbd3b6366813722d9d8a1243fd4743797
Connectionhistory Based Anomaly Detection.
83f53982d1f972a9de97b6bbee118e150b2b9cc20cd442db5d0cbe80d1947eb3