References
- Wenke Lee, Salvatore J. Stolfo, 'Data Mining Approaches for Intrusion Detection,' In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January, 1998
- Wenke Lee, Salvatore J. Stolfo and K. W. Mok, 'Mining audit data to build introduction dection models,' In Proceedings of the 4th International conference on Knowledge Discovery and Data Mining, New York, NY, AAAI Press, August, 1998
- W. Lee, 'A Data mining framework for constructing features and models for intrusion detection systems,' Ph.D thesis Columbia university, 1999
- Wenke Lee, Wei Fan, 'Mining System Audit Data : Opportunities and Challenges,' In Proceedings of the ACM SIGMOD special issue 4, New York, NY, December, 2001
- K. Julisch, 'Dealing with False Positives in Intrusion Detection,' In 3nd Workshop on Recent Advances in Intrusion Detection, http://www.raid-symposium.org, 2000
- Cuppens, F., Miege, A., 'Alert correlation in a cooperative intrusion detection framework,' In Proceedings of the IEEE Symposium on Security and Privacy, 2002 https://doi.org/10.1109/SECPRI.2002.1004372
- Chris Sinclair, Lyn Pierce, Sara Matzner, 'An Application of Machine Learning to Network Intrusion Detection,' In Proceeding of the 15th Annual computer security applications conference, Phoenix, Arizona, 1999 https://doi.org/10.1109/CSAC.1999.816048
- W. W. Cohen, 'Fast effective rule induction. In Machine Learning,' the 12th International Conference, Lake Taho, CA, Morgan Kaufmann, 1995
- W. Lee, 'A Data mining framework for constructing features and models for intrusion detection systems,' Ph.D thesis Columbia university, June, 1999
- Salvatore J. Stolfo, Wei Fan, Wenke Lee, 'Cost-based Modeling for Fraud and Intrusion Detection : Results from the JAM Project,' In Proceedings of the DARPA Information Survivability Conference and Exposition, 2000 https://doi.org/10.1109/DISCEX.2000.821515
- V. Paxson, 'Bro : A System for detecting network intruders in real-time,' In Proceedings of the 7th USENIX Security Symposium, 1998
- P. A. Porras, P. G. Neumann, 'EMERALD : Event monitoring enabling responses to anomalous live disturbances,' In National Information Systems Security Conference, 1997
- C. Warrender, S. Forrest, B. Pearlmutter, 'Detecting intrusions using system calls : Alternative data models,' In Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999 https://doi.org/10.1109/SECPRI.1999.766910
- S. Forest, S. Hofmeyr, A. Somayaji, T. A. Longstaff, 'A sense of self for Unix processes,' In Proceedings of the IEEE Symposium on Security and Privacy, 1996 https://doi.org/10.1109/SECPRI.1996.502675
- A. K. Ghosh, A. Schwartzbard, 'A study in using neural networks for anomaly and misuse detection,' In Proceedings of the 8th USENIX Security Symposium, 1999
- Jiawei Han, Micheline Kamber, 'Data Mining Concepts and Techniques,' Morgan Kaufmann Publishers, 2001
- R. Agrawal, T. Imielinski and A. Swami, 'Mining association rules between sets of items in large databases,' In Proceedings of the ACM SIGMOD Conference on Management of Data, 1993 https://doi.org/10.1145/170035.170072
- V. Jacobson, C. Leres, and S. McCanne, tcpdump. available via anonymous ftp to ftp.ee.lbl.gov, June, 1989