An Adaptive Intrusion Detection and Prevention System Approach to Network Security
Abstract
Keywords
Full Text:
PDFReferences
Bejtlich, Richard, Extrusion Detection, Addison-Wesley, 2005.
Bejtlich, Richard, The Tao of Network Security Monitoring: Beyond Intrusion Detection,Addison-Wesley, 2004.
Cui Wei Wu Sen Zhang Yuan Chen Lian-chang “Algorithm of Mining Sequential Patterns for Web Personalization Services”, ACM SIGMIS Volume 40 , Issue 2 (May 2009) Pages 57-66
Holger Dreger, Anja Feldmann, Michael Mai, Vern Paxson, Robin Sommer “Dynamic Application-Layer Protocol Analysis for Network I ntrusion Detection” Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
R. Kabila “Network Based Intrusion Detection and Prevention Systems in IP-Level “Security Protocols, World Academy of Science, Engineering and Technology 46 2008
Nazario, Jose, Defense and Detection Strategies against Internet Worms, Artech House Publishers, 2003.
Cisco Adaptive Wireless Intrusion Prevention System, C45-504521-00 11/08
Sandeep Kumar “Classification and detection of Computer Intrusions “August 1995.
Adrian G. Bors, “Introduction of the Radial Basis Function (RBF) Networks”.
Bakker and T. Heskes (2003). Task clustering and gating for Bayesian multitask learning. Journal of Machine Learning Research, 4: 83-99, 2003.
R. Caruana. (1997) Multitask learning. Machine Learning, 28, p. 41-75, 1997.
Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna, “Client-side cross-site scripting protection”, 6 April 2009.
El-Sayed M. El-Alfy, Fares S. Al-Qunaieer, “A Fuzzy Similarity Approach for Automated Spam Filtering ”, IEEE/ACS International Conference on Volume, Issue, March 31 2008-April 4 2008 Page(s):544 - 550
Georgios Petasis , Frantz Vichot , Francis Wolinski , Georgios Paliouras , Vangelis Karkaletsis , Constantine D. Spyropoulos , “Using Machine Learning to Maintain Rule-based Named-Entity Recognition and Classification Systems”, Proceedings of the 39th Annual Meeting on Association for Computational Linguistics Pages: 426 - 433 , 2001
IP Filtering for Patton RAS Products, “http://www.patton.com/manuals/AccessServer_Admin-D_lo-res.pdf”.
Junghoo Cho, Sridhar Rajagopalan, “A Fast Regular Expression Indexing Engine In ICDE”, 2002.
National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security, Subcommittee on Biometrics, 7 August 2006.
http://antivirus.about.com/od/whatisavirus/a/virussignature.htm
http://archives.neohapsis.com/archives/bugtraq/2 000-12/0241.html
http://www.sans.org/reading_room/whitepapers/detection/intrusion_detection_systems_definition_need_and_challenges_343
http://www.npu.edu/npu_highlights/rd_activities/NPU_Journal/07_journal/network_judy.pdf
“www.aclweb.org/anthology/P/P01/P01-1055.pdf”.
http://projects.ascharlott.com/files/536_paper.pdf
Intrusion-prevention system. Wikipedia. http://en.wikipedia.org/wiki/Intrusion_prevention_system
Oppliger, R. (1997). Internet Security: Firewalls and Beyond. Communications of the ACM, May 1997/Vol. 40, No. 5, pp 92-102.
Zhang, X., Li, C., & Zheng, W. (2004). Intrusion Prevention System Design. The Fourth International Conference on Computer and Information Technology (CIT'04), 2004.
Bace, R., & Mell, P. Intrusion Detection Systems. NIST Special Publication on Intrusion Detection System. http://www.snort.org/docs/nist-ids.pdf.
Basic Analysis and Security Engine. http://secureideas.sourceforge.net/
Cabrera, J., Lewis, L., Qin, L, Lee, W., & Mehra, R. (2002, June). Proactive Intrusion Detection and Distributed Denial of Service Attacks – A Case Study in Security Management. Journal of Network and Systems Management, Vol. 10, No. 2, pp 225-253
Comer, D. (2004). Computer Networks and Internets, 4th ed. Upper Saddle River, NJ: Pearson, Prentice Hall.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.