|
[1] K. Ahsan and D. Kundur, “Practical data hiding in TCP/IP,” Proceedings of the Workshop on Multimedia Security at ACM Multimedia, 2002, French Riviera, France, pp. 7–15, 2002.
[2] E. Ardizzone, A. Chella and R.Pirrone, “An Architecture for Automatic Gesture Analysis,” Proceedings of the Working Conference on Advanced Visual Interfaces, May, 2000.
[3] S. Akhtar, “A Proposed Model to Use ID3 Algorithm in the Classifier of a Network Intrusion Detection System,” 9th International Multitopic Conference, IEEE INMIC, 2005.
[4] D. Barbara, J. Couto, S. Jajodia, L. Popyack and N. Wu, “ADAM: Detecting Intrusions by Data Mining,” IEEE Workshop on Information Assurance and Security, 2001.
[5] E. Biermann, E. Cloete and L. M. Venter, “A Comparison of Intrusion Detection Systems,” Computer &; Security, Vol. 20, pp. 676-683, 2001.
[6] B. E. Boser, I. M. Guyon and V. N. Vapnik, “A training algorithm for optimal margin classifiers,” Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, Pittsburgh, PA, pp. 144-152, 1992.
[7] C. J. C. Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Data Mining and Knowledge Discovery, Vol.2, No.2, pp. 121-167, 1998.
[8] W.W. Cohen, “Efficient Pruning Methods for Separate-and-conquer Rule Learning Systems,” Proceedings of the 13th International Joint Conference on Artificial Intelligence, Chambery, France, pp. 988-994, 1993.
[9] D. Dasgupta and F. A. Gonzalez, “An Intelligent Decision Support System for Intrusion Detection and Response,” Proceeding of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2001.
[10] O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, “An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks,” Expert Systems with Applications, Vol. 29, pp. 713-722, 2005.
[11] P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava and P. Tan, “Data Mining for Network Intrusion Detection,” Proceedings of NSF Workshop on Next Generation Data Mining, November, 2002.
[12] L. Feinstein, D. Schnackenberg, R. Balupari and D. Kindred, “Statistical Approaches to DDoS Attacks Detection and Response,” Proceedings of the DARPA Information Survivability Conference on Exposition, 2003.
[13] B. A. Forouzan, TCP/IP Protocol Suite, McGraw. HILL, 2003.
[14] K. Hwang, Y. Chen and H. Liu, “Defending Distributed Systems Against Malicious Intrusions and Network Anomalies,” Proceedings of the 19th IEEE Parallel and Distributed Processing Symposium, 2005.
[15] M.A. Hearst, S.T. Dumais, E. Osman, J. Platt and B. Scholkopf, “Support Vector Machines,” IEEE Intelligent Systems, Vol. 13, No. 4, pp. 18-28, 1998.
[16] Y.J. Lee and O. L. Mangasarian, “SSVM: Smooth Support Vector Machine for Classification,” Computational Optimization and Application, Vol.20, No. 1, pp. 5-22, October, 2001.
[17] R. Lippmann, J. W. Haines, D. J. Fried, J. Korba and K. Das, “The 1999 DARPA Off-Line Intrusion Detection Evaluation,” Draft of paper submitted to Computer Networks, In Press, 2000.
[18] M. V. Mahoney, “Network Traffic Anomaly Detection Based on Packet Bytes,” Proceedings of the 18th ACM Symposium on Applied Computing, Melbourne, FL, USA, pp. 346-350, 2003.
[19] M. V. Mahoney and P.K. Chan, “An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection,” Computer Science Department, Florida Institute of Technology Technical Report CD-2003-02, 2003.
[20] S. Mukkamala, G. I. Janoski and A. H. Sung, “Intrusion Detection Using Neural Networks and Support Vector Machines,” Proceedings of the 2002 International Joint Conference on Neural Networks, Vol.2, pp. 1702-1707, May 12-17, 2002.
[21] S. Mukkamala, G. I. Janoski and A. H. Sung, “Feature Ranking and Selection for Intrusion Detection Systems Using SVMs and ANNs,” Proceedings of the International Conference on Information and Knowledge Engineering, pp. 503-509, June, 2002.
[22] S. Mukkamala and A. H. Sung, “Identify Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks,” Proceedings of Symposium on Applications and the Internet, pp. 209-216, 2003.
[23] S. Mukkamala and A. H. Sung, “Detecting Denial of Service Attacks Using Support Vector Machines,” The IEEE International Conference on Fuzzy Systems, pp. 1231-1236, 2003.
[24] P. Sandhya, A. Ajith, G. Crina and T. Johnson, “Modeling Intrusion Detection System Using Hybrid Intelligent Systems,” Journal of Network and Computer Applications, Vol.30, pp. 114-132, 2007.
[25] X. Q. Zhang, C. H. Gu and J. J. Lin, “Support Vector Machines for Anomaly Detection,” Proceedings of the 6th World Congress on Intelligent Control and Automation, Dalian, China, June 21–23, 2006.
[26] C. C. Chang and C. J. Lin, LIBSVM: a library for support vector machines, 2001. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm
[27] DARPA 1999 dataset. Available: http://www.ll.mit.edu/IST/ideval/index.html
[28] KDDCUP' 99 dataset. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
[29] SNORT, an open source network intrusion detection system. Available: http://www.snort.org/
[30] SPADE, Silicon Defense. Available: http://www.silicondefense.com/software/spice/
[31] Tcpdump tool. Available: http://www.tcpdump.org/
[32] Testbed@TWISC - Network Emulation Testbed Home. Available: http://testbed.ncku.edu.tw/.
|