References
- A. Wool, "A quantitative study of firewall configuration errors", Computer, vol. 37, no. 6, pp. 62-67, 2004. https://doi.org/10.1109/mc.2004.2
- Y. Qi, B. Yang, B. Xu, and J. Li, "Towards system-level optimization for high performance unified threat management," in proc. of IEEE ICNS 2007. https://doi.org/10.1109/icns.2007.126
- T. Krueger, C. Gehl, K. Rieck, and P. Laskov, "Tokdoc: A selfhealing web application firewall," in Proceedings of the 2010 ACM Symposium on Applied Computing. ACM, 2010, pp. 1846-1853. https://doi.org/10.1145/1774088.1774480
- X. Zhang, C. Li, and W. Zheng, "Intrusion prevention system design," in Computer and Information Technology, International Conference on. IEEE Computer Society, 2004, pp. 386-390. https://doi.org/10.1109/cit.2004.1357226
- SNORT, https://www.snort.org/.
- S. Lee et al. "LARGen: Automatic Signature Generation for Malwares Using Latent Dirichlet Allocation," IEEE Transactions on Dependable and Secure Computing (2016). https://doi.org/10.1109/tdsc.2016.2609907
- Hofmann, Thomas. "Probabilistic latent semantic analysis." Proceedings of the 15th conference on Uncertainty in artificial intelligence. Morgan Kaufmann Publishers Inc., 1999. http://www.iro.umontreal.ca/-nie/IFT6255/Hofmann-UAI99.pdf
- Blei, David M. "Probabilistic topic models." Communications of the ACM 55.4 (2012): 77-84. https://doi.org/10.1145/2133806.2133826
- D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet Allocation," the Journal of machine Learning research, vol. 3, pp. 993-1022, 2003. https://endymecy.gitbooks.io/spark-ml-source-analysis/content/%E8%81%9A%E7%B1%BB/LDA/docs/Latent%20Dirichlet%20Allocation.pdf
- J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically generating signatures for polymorphic worms," in Security and Privacy, 2005 IEEE Symposium on. IEEE, 2005, pp. 226-241. https://doi.org/10.1109/sp.2005.15
- R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif, "Misleading worm signature generators using deliberate noise injection,"in Security and Privacy, 2006 IEEE Symposium on. IEEE, 2006. https://doi.org/10.1109/sp.2006.26
- M. M. Mohammed, H. A. Chan, and N. Ventura, "Honeycyber: Automated signature generation for zero-day polymorphic worms," in Military Communications Conference, 2008. MILCOM 2008. IEEE. IEEE, 2008, pp. 1-6. https://doi.org/10.1109/milcom.2008.4753178
- Jolliffe, Ian. Principal component analysis. John Wiley & Sons, Ltd, 2002. http://dx.doi.org/10.1007/b98835
- G. Tahan, C. Glezer, Y. Elovici, and L. Rokach, "Auto-sign: an automatic signature generator for high-speed malware filtering devices," Journal in computer virology, vol. 6, no. 2, pp. 91-103, 2010. https://doi.org/10.1007/s11416-009-0119-3
- A. Tongaonkar, R. Keralapura, and A. Nucci, "Santaclass: A self adaptive network traffic classification system," in IFIP Networking Conference, 2013. IEEE, 2013, pp. 1-9. http://ieeexplore.ieee.org/document/6663505/
- Z. Zhang, Z. Zhang, P. P. Lee, Y. Liu, and G. Xie, "Proword: An unsupervised approach to protocol feature word extraction," in INFOCOM, 2014 Proceedings IEEE. IEEE, 2014, pp. 1393-1401. https://doi.org/10.1109/infocom.2014.6848073
- H. J. Wang, C. Guo, D. R. Simon, and A. Zugenmaier, "Shield: Vulnerability-driven network filters for preventing known vulnerability exploits," ACM SIGCOMM 2004. https://doi.org/10.1145/1015467.1015489
- Z. Li, G. Xia, H. Gao, Y. Tang, Y. Chen, B. Liu, J. Jiang, and Y. Lv, "Netshield: massive semantics based vulnerability signature matching for high-speed networks," ACM SIGCOMM 2010. https://doi.org/10.1145/1851182.1851216
- T. L. Griffiths and M. Steyvers, "Finding scientific topics," Proceedings of the National academy of Sciences, vol. 101, no. suppl 1, pp. 5228-5235, 2004. http://psiexp.ss.uci.edu/research/papers/sciencetopics.pdf https://doi.org/10.1073/pnas.0307752101
- Sood, Aditya K., Richard J. Enbody, and Rohit Bansal. "Dissecting SpyEye-Understanding the design of third generation botnets." Computer Networks 57.2 (2013): 436-450. https://doi.org/10.1016/j.comnet.2012.06.021
- M. Parkour, "blog sobre comparticion de malware, recurso en l'inea disponible," 2014. http://contagiodump.blogspot.com/
- Netresec, "Capture files from Mid-Atlantic CCDC," http://www.netresec.com/?page=MACCDC, 2014.
- CAIDA. http://www.caida.org/home/
- G. Heinrich, "Parameter estimation for text analysis," in Technical Report. Fraunhofer IGD, Darmstadt, Germany, 2009. http://www.arbylon.net/publications/text-est2.pdf
- Kim, Hyunchul, et al. "Internet traffic classification demystified: myths, caveats, and the best practices." Proceedings of the 2008 ACM CoNEXT conference. ACM, 2008.https://doi.org/10.1145/1544012.1544023
- jpcap. http://jpcap.sourceforge.net/
- A Java Implementation of Latent Dirichlet Allocation (LDA) using Gibbs Sampling for Parameter Estimation and Inference. http://jgibblda.sourceforge.net/