|
[1]IEEE Std 802.11, “Wireless Lan Medium Access Control (MAC) And Physical Layer (PHY) Specifications”, IEEE Std 802.11, 1997. [2]Mtthew S. Gast, “802.11 Wireless Networks: The Definitive Guide”, O’Reilly & Associates Inc., 2002. [3]IEEE std 802.16, “Coexistence of Fixed Broadband Wireless Access Systems”, April 2002. [4]IEEE std 802.16a, “Air Interface for Fixed Broadband Wireless Access Systems”, January 2003. [5]Wuu, L.C., Chen, Y.H., “A Practice of the Intrusion Prevention System”, IEEE International Conference on TENCON 2007, TAIWAN. [6]H. Han, X.L. Lu, J. Lu, C. Bo, and R.L. Yong, “Data Mining Aided Signature Discovery in Network-based Intrusion Detection System”, ACM SIGOPS Operating Systems Review, Volume 36 Issue 4, October 2002, pp.7-13. [7]W. Lee and S.J. Stolfo, “Data mining approaches for intrusion detection”, 7th USENIX Security Symposium, 1998, pp.79-94. [8]W. Lee, S.J. Stolfo, K.W. Mok, “A data mining framework for building intrusion detection models”, IEEE Symposium on Security and Privacy, 1999, pp.120-132. [9]W. Lee, “A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems”, PhD thesis, Columbia University, June 1999. [10]W. Lee, S.J. Stolfo, K.W. Mok, “Data mining in work flow environments: Experiences in intrusion detection”, ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD-99), August 1999, pp.114-124. [11]W. Lee, S.J. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang, “Real Time Data Mining-based Intrusion Detection”, IEEE Second DARPA Information Survivability Conference and Exposition, 2001, pp.I85-100. [12]J. Ayres, J. Flannick, J. Gehrke and T. Yiu, “Sequential PAttern Mining using a bitmap representation”, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, July 2002. [13]R. Agrawal, R. Srikant, “Fast Algorithms for Mining Association Rules”, 20th Int''l Conference on Very Large Databases(VLDB), September 1994, pp.487-499. [14]R. Srikant, R. Agrawal, “Mining Generalized Association Rules”, 21th Int''l Conference on Very Large Databases, September 1995, pp. 407-419. [15]R. Agrawal and R. Srikant, “Mining sequential patterns”, in Proceedings of the Eleventh International Conference on Data Engineering (ICDE), 1995, pages 3–14. [16]R. Agrawal and R. Srikant, “Mining sequential patterns: Generalizations and performance improvements”, in Proceedings of the Fifth International Conference on Extending Database Technology (EDBT), vol.1057, 1996, pp.3–17. [17]J. Pei, J. Han, B. Mortazavi-Asl, H. Pinto, Q. Chen, U.Dayal, and M.-C. Hsu, “PrefixSpan: Mining sequential patterns efficiently by prefix projected pattern growth”, In Proceedings of the 17th International Conference on Data Engineering (ICDE), 2001, pp.215–224. [18]B. D. Kang, J. W. Lee, J. H. Kim, O. H. Kwon, C.Y. Seong and S.K. Kim, “An intrusion detection system using principal component analysis and time delay neural network”, Proceedings of 7th International Workshop on Enterprise networking and Computing in Healthcare Industry, June 2005, pp.442–445 [19]D. S. Kim, H. N. Nguyen and J. S. Park, “Genetic algorithm to improve SVM based network intrusion detection system”, 19th International Conference on Advanced Information Networking and Applications, Vol.2, March 2005, pp.155 - 158. [20]S. M. Bridges, “Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection”, 23rd National Information Systems Security Conference, October 2000. [21]FreeRADIUS Team, “FreeRADIUS” ,http://freeradius.org/, [22]伍麗樵、詹士賢,2005, “入侵偵測系統之IP Tracaback機制”,2005 Workshop on Wireless, Ad Hoc, and Sensor Networks, TAIWAN. [23]Chyouhwa Chen, Huei-Wen Ferng, Jun-Chuan Chen, Hao-Lun Chin, and David Shiung, “A Class-Based Queueing Service for IEEE 802.11e Wireless Networks”, IEEE 2004 [24]S. Floyd and V. Jacobson, “Link-Sharing and resource management models for packet networks”, IEEE/ACM Transactions on Networking, August 1995. [25]KJ. Loh, I. Gui and KC. Chua, “Performance of a Linux Implementation of Class Based Queueing”, Computer Communications and Networks Proceeding, October 1998. [26]IEEE std 802.1x, “Port-based Network Access Control”, 2004. [27]Matthew Gast. , “802.11 Wireless Networks: The Definitive Guide”, O’ RELLY [28]Bert Hubert et al., “Linux Advanced Routing and Traffic Control HOWTO”, http://lartc.org/ [29]Paul E. McKenney, “Stochastic Fairness Queueing”, IEEE 1990 [30]Wu-chang Feng, et al., “Stochastic Fair Blue A Queue Management Algorithm for Enforcing Fairness”, IEEE INFOCOM 2001 [31]Jiawei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, March 2006. [32]R. Agrawal, T. Imielinski and A. Swami(1993), “Mining Association Rules between Sets of Items in Large Database,” ACM, pp.207-216. [33]R. Agrawal and R. Srikant(1994), “Fast Algorithm for Mining Association Rules in Large Databases,” Proceeding of the 20th International Conference on Very Large Data Bases, September, pp487-499. [34]J. Han, J. Pei, and Y. Yin (2000), “Mining Frequent Patterns without Candidate Generation”, Proc. 2000 ACM-SIGMOD Int’l Conf. Management of Data (SIGMOD ’00), May 2000, pp. 1-12. [35]Winpcap, ” WinPcap: The Windows Packet Capture Library” http://www.winpcap.org/ [36]Transmission Control Protocol , “RFC 793 (rfc793) - Transmission Control Protocol”, RFC 793 [37]J.Zheng, M.Z.HU, H.L.Zhang , “A New Method of Data Preprocessing and Anomaly Detection”, Proceedings of the Third International Conference on Machine Learning and Cybernetics, Shanghai, 26-29 August 2004 [38]HainingWang, Danlu Zhang, and Kang G. Shin. “Detecting SYN Flooding attacks.” In Proceedings of IEEE Infocom’2002, June 2002. [39]Jian Kang, Zhe Zhang, Jiu-bin Ju, “Protect E-commerce against DDoS Attacks with Improved D-WARD Detection System” , IEEE International Conference on e-Technology, e-Commerce and e-Service, March 2005
|