參考文獻 |
[HLMS90] R. Heady, G. Luger, A. Maccabe, M. Servilla, “The architecture of a network level intrusion detection system,” Technical report, Computer Science Department, University of New Mexico, August 1990.
[HBV03] Mahmood Hossain, Susan M. Bridges, Rayford B. Vaughn, “Adaptive Intrusion Detection with Data Mining,” In Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 2003.
[KS95] S. Kumar, E. H. Spafford, “A software architecture to support misuse intrusion detection,” In Proceedings of the 18th National Information Security Conference, pages 194-204, 1995.
[IKP95] K. Ilgun, R. A. Kemmerer, P. A. Porras, “State transition analysis: A rule-based intrusion detection approach,” IEEE Transactions on Software Engineering, 1995.
[LTG+92] T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, T. Garvey, ”A real-time intrusion detection expert system (IDES) – final technical report,” Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, 1992.
[HFS98] S. A. Hofmeyr, S. Forrest, A. Somayaji, “Intrusion detection using sequences of system calls,” Journal of Computer Security, Volume 6 pages 151-180, 1998.
[LS98] Wenke Lee, Salvatore J. Stolfo, “Data Mining Approaches for Intrusion Detection,” In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998.
[FPSS96] U. Fayyad, G. Piatetsky-Shapiro, P. Smyth, “The KDD process of extracting useful knowledge from volumes of data,” Communication of the ACM, 39(11): 27-34, 1996.
[XG04] Man-Jiang Xu, Gang Gu, “Method and Usage of Mining Association Rules in System Call Serial,” In the 4th Computer Systems & Applications 2004, 2004.
[LP05] Tian-rui Li, Wu-ming Pan, “Intrusion Detection System Based on New Association Rule Mining Model,” 2005 IEEE International Conference on Granular Computing, Beijing, China, Volume 2 pages 512-515, 2005.
[AS94] R. Agrawal, A. Swami, “Fast algorithms for mining association rules,” In Proceedings of the 20th VLDB Conference, Santiago, Chile, 1994.
[LSC97] Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, “Learning patterns from unix process execution traces for intrusion detection,” In AAAI Workshop: AI Approaches to Fraud Detection and Risk Management, pages 50-56, AAAI Press, July 1997.
[LSM99] Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, “A Data Mining Framework for Building Intrusion Detection Model,” In Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
[Lee99] Wenke Lee, “A Data Mining Framework for Constructing Features and Model for Intrusion Detection System,” Ph.D Dissertations, Columbia University, New York, USA 1999.
[LS00] Wenke Lee, Salvatore J. Stolfo, “A framework for constructing features and models for intrusion detection systems,” ACM Transactions on Information and System Security, Volume 3, Number 4, 2000.
[SLCFE01] Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin, “Special section on data mining for intrusion detection and threat analysis: Data mining-based intrusion detectors: an overview of the columbia IDS project,” ACM SIGMOD Record, Volume 30 No 4, December 2001.
[WHX06] Xuren Wang, Famei He, Rongsheng Xu, “Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework,” In Proceedings of IEEE International Conference on Computational Intelligence for Modeling Control and Automation, and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), page 24, 2006.
[KFH05] Dae-Ki Kang, Doug Fuller, Vasant Honavar, ”Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation,” In Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI-2005), Atlanta, GA, USA, May 19-20, 2005; Lecture Notes in Computer Science, Vol. 3495, pages 511-516, 2005.
[LBM05] Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Manalwar, “Exploiting Efficient Data Mining Techniques to Enhance Intrusion Detection Systems,” In Proceedings of IEEE International Conference on Information Reuse and Integration, pages 512-517, Las Vegas, Nevada, 2005.
[YA04] M. M. Yasin, Awais A. Awan, ”A study of host-based IDS using system calls,” In IEEE International Conference on Networking and Communication, 2004.
[BK03] Yuebin Bai, Hidetsune Kobayashi, “Intrusion Detection Systems: Technology and Development,” In Proceedings of the 17th IEEE International Conference on Advanced Information Networking and Applications (AINA’03), 2003.
[KMP77] Donald E. Knuth, James H. Morris Jr., Vaughan R. Pratt, ”Fast pattern matching in strings,” SIAM Journal on Computing, 6(2): 323-350, 1977.
[KR81] Richard M. Karp, Michael O. Rabin, “Efficient randomized pattern-matching algorithms,” Technical Report TR-31-81, Aiken Computation Laboratory, Harvard University, 1981.
[BM77] Robert S. Boyer, J. Strother Moore, “A fast string-searching algorithm,” Communications of the ACM, 20(10): 762-772, 1977.
[Wei73] P. Weiner, “Linear pattern matching algorithm,” In 14th Annual IEEE Symposium on Switching and Automata Theory, pages 1-11, 1973.
[McC76] Edward M. McCreight, “A Space-Economical Suffix Tree Construction Algorithm,” Journal of ACM 23, pages 262-272, 1976.
[Ukk95] Esko Ukkonen, “On-line construction of suffix trees,” Algorithmica, I4:249-60, 1995.
[AIS93] R.Agrawal, T. Imielinski, A. Swami, “Mining association rules between sets of items in large databases,” In Proceedings of the SIGMOD Conference on Management of Data, pages 207-216, Washington, D.C., 1993.
[SA95] R. Srikant, R. Agrawal, “Mining generalized association rules,” In Proceedings of the 21st VLDB Conference, Zurich, Switzerland, 1995.
[MTV95] H. Mannila, H. Toivonen, A. I. Verkamo, “Discovering frequent episodes in sequences,” In Proceedings of the 1st International Conference on Knowledge Discovery in Databases and Data Mining, Montreal, Canada, 1995.
[KFL94] C. Ko, G. Fink, K. Levitt, “Automated detection of vulnerabilities in privileged programs by execution monitoring,” In Proceedings of the 10th Annual Computer Security Applications Conference, pages 134-144, December 1994.
[FHSL96] S. Forrest, S. A. Hofmeyr, A. Somayaji, T. A. Longstaff, “A Sense of Self for Unix Processes,” In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Los Alamitos, 1996.
[WFP99] Christina Warrender, Stephanie Forrest, Barak Pearlmutter, “Detecting Intrusion Using System Calls: Alternative Data Models,” 1999 IEEE Symposium on Security and Privacy, 1999. |