Increasing Reliability in Network Traffic Anomaly Detection

作者: Romain Thibault Fontugne

DOI:

关键词:

摘要:

参考文章(29)
Fabian Fischer, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel, Large-Scale Network Monitoring for Visual Analysis of Attacks visualization for computer security. pp. 111- 118 ,(2008) , 10.1007/978-3-540-85933-8_11
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, B. Watson, IDGraphs: intrusion detection and analysis using histographs visualization for computer security. pp. 5- 5 ,(2005) , 10.1109/VIZSEC.2005.7
Ramakrishnan Srikant, Rakesh Agrawal, Fast Algorithms for Mining Association Rules in Large Databases very large data bases. pp. 487- 499 ,(1994)
B. Irwin, J. -P. van Riel, Using InetVis to Evaluate Snort and Bro Scan Detection on a Network Telescope visualization for computer security. pp. 255- 273 ,(2008) , 10.1007/978-3-540-78243-8_17
Raffael Marty, Applied Security Visualization ,(2008)
Kensuke Fukuda, An Analysis of Longitudinal TCP Passive Measurements (Short Paper) traffic monitoring and analysis. pp. 29- 36 ,(2011) , 10.1007/978-3-642-20305-3_3
John McHugh, Testing Intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 262- 294 ,(2000) , 10.1145/382912.382923
Peter Hart, How the Hough transform was invented [DSP History] IEEE Signal Processing Magazine. ,vol. 26, pp. 18- 22 ,(2009) , 10.1109/MSP.2009.934181
Wei Lu, Ali A. Ghorbani, Network anomaly detection based on wavelet analysis EURASIP Journal on Advances in Signal Processing. ,vol. 2009, pp. 837601- ,(2009) , 10.1155/2009/837601
J. Illingworth, J. Kittler, A survey of the Hough transform Graphical Models \/graphical Models and Image Processing \/computer Vision, Graphics, and Image Processing. ,vol. 44, pp. 87- 116 ,(1988) , 10.1016/S0734-189X(88)80033-1