[1]
|
R. Perdisci, G. Gu, and W. Lee, “Using an Ensemble of One-Class svm Classifiers to Harden Payload-Based Anomaly Detection Systems,” ICDM ’06: Proceedings of the Sixth Integnation Conference on Data Mining, Hong Kong, 18-22 December 2006, pp. 488-498.
doi:10.1109/ICDM.2006.165
|
[2]
|
D. Anderson, T. Lunt, H. Javits, and A. Tamaru. “Nides: Detecting Unusual Program Behavior Using the Statistical Component of the Next Generation Intrusion Detection Expert System,” Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, May 1995.
|
[3]
|
R. Perdisci, “Statistical Pattern Recognition Techniques for Intrusion Detection in Computer Networks, Challenges and Solutions,” University of Cagliari, Italy, 2006.
|
[4]
|
M. Mahoney and P. Chan, “Learning Non Stationary Models of Normal Network Tra?c for Detecting Novel Attacks,” ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, July 2002, pp. 376-385.
|
[5]
|
M. Mahoney, “Network Trafic Anomaly Detection Based on Packet Bytes,” ACM-SAC, Melbourne FL, 2003 pp. 346-350.
|
[6]
|
R. Perdisci, D. Ariu, P. Fogla, G. Giacinto and W. Lee, “McPAD: A Multiple Classifier System for Accurate Payload-based Anomaly Detection,” Computer Networks, Special Issue on Traffic Classification and Its Applications to Modern Networks, Vol. 5 No. 6, 2009, pp. 864- 881.
|
[7]
|
K. Wang and S. Stolfo, “Anomalous Payload-Based Network Intrusion Detection,” Recent Advances in Intrusion Detection (RAID), Vol. 3224, 2004, pp. 203-222.
doi:10.1007/978-3-540-30143-1_11
|
[8]
|
K. Wang, “Network Payload-based Anomaly Detection and Content-based Alert Correlation” Ph.D. Thesis, Columbia University, New York, 2006.
|
[9]
|
J. Tang, “An algorithm for Streaming Clustering”, MSc. Thesis, Uppsala University, Uppsala Sweden, 2011.
|
[10]
|
A. Bifet, G. Holmes, R. Kirkby and B. Pfahringer, “MOA: Massive Online Analysis,” Journal of Machine Learning Research 11, 2010, pp. 1601-1604.
|
[11]
|
F. Cao, M. Ester, W. Qian and A. Zhou, “Density-Based Clustering over an Evolving Data Stream with Noise,” SIAM Conference Data Mining, Bethesda, 2006.
|
[12]
|
R. Lippmann, J. Haines, D. Fried, J. Korba and K. Das, “The 1999 DARPA Off-Line Intrusion Detection Evaluation,” Computer Networks, Vol. 34, No. 4, 2000, pp. 579- 595. doi:10.1016/S1389-1286(00)00139-0
|
[13]
|
K. L. Ingham and H. Inoue, “Comparing Anomaly Detection Techniques for HTTP,” Recent Advances in Intrusion Detection (RAID), 2007.
|
[14]
|
T. Detristan, T. Ulenspiegel, Y. Malcom and M. Underduk, “Polymorphic Shellcode Engine Using Spectrum Analysis,” Phrack, Vol. 11, No. 61, 2003.
|
[15]
|
I.H. Witten and E. Frank, “Data Mining: Practical Machine Learning Tools and Techniques,” Second Edition, Morgan Kaufmann Publishers, Waltham, 2005.
|
[16]
|
L. Portnoy, E. Eskin and S. Stolfo, “Intrusion Detection with Unlabeled Data Using Clustering,” ACM CSS Workshop on Data Mining Applied to Security, 2001.
|
[17]
|
M. Ester, H. Kriegel, J. Sander and X. Xu, “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise,” International Conference on Knowledge Discovery in Databases and Data Mining (KDD-96), Portland, August 1996, pp. 226-231.
|
[18]
|
K. Mumtaz and K. Duraiswamy, “An Analysis on Density Based Clustering of Multi Dimensional Spatial Data,” Indian Journal of Computer Science and Engineering, Vol. 1, No. 1, 2010, pp. 8-12.
|
[19]
|
A. Forestiero, C. Pizzuti and G. Spezzano, “FlockStream: a Bio-Inspired Algorithm for Clustering Evolving Data Streams,” ICTAI ’09 Proceedings of the 2009 21st IEEE International Conference on Tools with Artificial Intelligence, Washington DC, 2009, pp. 1-8.
|