An Integrated Network Security Approach - Pairing Detecting Malicious Patterns with Anomaly Detection.

作者: Ulrich Ultes-Nitsche , InSeon Yoo

DOI:

关键词:

摘要:

参考文章(7)
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)
Eugene H. Spafford, Christoph Ludwig Schuba, On the modeling, design, and implementation of firewall technology Purdue University. ,(1997)
G.J. Tesauro, J.O. Kephart, G.B. Sorkin, Neural networks for computer virus recognition IEEE Intelligent Systems. ,vol. 11, pp. 5- 6 ,(1996) , 10.1109/64.511768
Kevin Richards, Network based intrusion detection: A review of technologies Computers & Security. ,vol. 18, pp. 671- 682 ,(1999) , 10.1016/S0167-4048(99)80131-X
Jun Xu, Mukesh Singhal, Design of a high-performance ATM firewall ACM Transactions on Information and System Security. ,vol. 2, pp. 269- 294 ,(1999) , 10.1145/322510.322520
S.C. Lee, D.V. Heinbuch, Training a neural-network based intrusion detector to recognize novel attacks systems man and cybernetics. ,vol. 31, pp. 294- 299 ,(2001) , 10.1109/3468.935046