A Framework for Constructing Features and Models for Intrusion Detection Systems (2000)

by Wenke Lee , Salvatore J. Stolfo
Venue:ACM Transactions on Information and System Security
Citations:168 - 7 self

Documents Related by Co-Citation

161 Temporal sequence learning and data reduction for anomaly detection – Terran Lane, Carla E. Brodley - 1999
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
74 Intrusion Detection – R G Bace - 2000
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
293 Intrusion Detection using Sequences of System Calls – Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji - 1998
170 A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data – Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo - 2002
334 Detecting intrusion using system calls: alternative data models – Christina Warrender, Stephanie Forrest, Barak Pearlmutter - 1999
822 Snort - Lightweight Intrusion Detection for Networks – Martin Roesch, Stanford Telecommunications - 1999
260 A data mining framework for building intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1999
105 2000. “State of the practice of intrusion detection technologies.” Carnegie Mellon University. Software Engineering Institute. CMU/ SEI-99-TR-028 ESC-TR-99-028 www.sei.cmu.edu/publications/documents/99.reports/99tr028/99tr028title.html Ananth, Dr. K.P. 20 – Julia Allen, Alan Christie, William Fithen, John Mchugh, Jed Pickel, James Ellis, Eric Hayes, Jerome Marella, Bradford Willke, Julia Allen, Alan Christie, William Fithen, John Mchugh, Jed Pickel, James Ellis, Eric Hayes, Jerome Marella, Bradford Willke - 2005
72 Detecting novel network intrusions using Bayes estimators – D Barbara, N Wu, S Jajodia
30 Gauging similarity with n-grams: language independent categorization of text – Marc Damashek - 1995
58 "Why 6?" Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector – Kymie M. C. Tan, Roy A. Maxion - 2001
354 EMERALD: Event monitoring enabling responses to anomalous live disturbances – Phillip A. Porras, Peter G. Neumann - 1997
455 An intrusion-detection model – Dorothy E. Denning - 1987
20 The NIDES statistical component: Description and justification – H S Javits, A Valdes - 1993
2702 Authoritative Sources in a Hyperlinked Environment – Jon M. Kleinberg - 1999
36 ADAM: Detecting Intrusions by Data Mining – Daniel Barbará, Julia Couto, Sushil Jajodia, Leonard Popyack, Ningning Wu - 2001
85 Mining audit data to build intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1998