An Improved Performance Evaluation on Collaborative Intrusion Detection System
Abstract
Keywords
Full Text:
PDFReferences
William Stallings, “Cryptography and N/W Security”, Third Edition,2000
Atul Kahate,” Cryptography and N/W Security”,2006
Herbert Schildt, 2001, JAVA 2: The Complete Reference, TATA McGrawHill, Fourth Edition.
W.Lee,” A Framework for constructing Features and models for IDS”,Vol.3,No 4 ,Nov 2000.pp.227-261
D.J.Ragsdale, U.Pooch,” adaptation Techniques for Intrusion Detection and Response Systems”, Proc. IEEE Int’l Conference systems.pp.2344-2349, Oct.2000.
B.CaseWell and J.Beale,SNORT 2.1,Intrusion Detection, second ed.syngress,May 2004
H.Mannila and Toivonen, ”Discovring Generalized Episodes using Minimal Occurances”, second .Knowledge Discovery and Data Mining, 1996.
J.E. Gaffney and Ulvia : “ Evaluation of Intrusion Detectors, a decision theory approach”,2001.
Chunfu Jia and Deqiang Cheng: “Performance Evaluation of a Collaborative Intrusion Detection System “, 2009.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.