18.11.2014 Views

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

Anais - Engenharia de Redes de Comunicação - UnB

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Fawcett, T. (2003). ROC Graphs: Notes and Practical Consi<strong>de</strong>rations for Researchers.<br />

Tech Report HPL-2003-4, HP Laboratories. Available: http://www.purl.org/<br />

NET/tfawcett/papers/ROC101.pdf.<br />

Guan, Y., Ghorbani, A. A., and Belacel, N. (2003). Y-means: A Clustering Method<br />

for Intrusion Detection. In Proceedings of Canadian Conference on Electrical and<br />

Computer Engineering, pages 1083–1086.<br />

iCTF (2008). The 2008 iCTF Data (http://ictf.cs.ucsb.edu/data/<br />

ictf2008/ - acesso em 10/07/2011).<br />

KDD (1999). KDD Cup 1999 databases (http://kdd.ics.uci.edu/<br />

databases/kddcup99/kddcup99.html - acesso em 10/07/2011).<br />

Leung, K. and Leckie, C. (2005). Unsupervised Anomaly Detection in Network Intrusion<br />

Detection using Clusters. In Proceedings of the Twenty-eighth Australasian conference<br />

on Computer Science - Volume 38, ACSC ’05, pages 333–342, Darlinghurst, Australia,<br />

Australia. Australian Computer Society, Inc.<br />

Mahoney, M. V., Chan, P. K., and Arshad, M. H. (2003). A Machine Learning Approach<br />

to Anomaly Detection. Technical Report CS-2003-06, Department of Computer<br />

Science, Florida Institute of Technology, Melbourne, FL.<br />

Nessus (2011). Nessus Vulnerability Scanner (http://www.nessus.org/ - acesso<br />

em 10/07/2011).<br />

Nikto (2011). Nikto Open Source web server scanner (http://www.cirt.net/<br />

nikto2 - acesso em 10/07/2011).<br />

Pereira, H. (2011). Sistema <strong>de</strong> Detecção <strong>de</strong> Intrusão para Serviços Web baseado em<br />

Anomalias. Master’s thesis, PUCPR, Curitiba - PR.<br />

Petrović, S. (2006). A Comparison Between the Silhouette In<strong>de</strong>x and the Davies-Bouldin<br />

In<strong>de</strong>x in Labelling IDS Clusters. Proceedings of the 11th Nordic Workshop of Secure<br />

IT, pages 53–64.<br />

Portnoy, L., Eskin, E., and Stolfo, S. (2001). Intrusion Detection with Unlabeled Data<br />

Using clustering. In Proceedings of ACM Workshop on Data Mining Applied to Security.<br />

Robertson, W., Maggi, F., Kruegel, C., and Vigna, G. (2010). Effective Anomaly Detection<br />

with Scarce Training Data. In Proceedings of the Network and Distributed System<br />

Security Symposium (NDSS), San Diego, CA.<br />

Singh, G., Masseglia, F., Fiot, C., Marascu, A., and Poncelet, P. (2009). Mining Common<br />

Outliers for Intrusion Detection. In EGC (best of volume), pages 217–234.<br />

Zhang, Y.-F., Xiong, Z.-Y., and Wang, X.-Q. (2005). Distributed Intrusion Detection<br />

based on Clustering. Machine Learning and Cybernetics, 2005. Proceedings of 2005<br />

International Conference on, 4:2379–2383 Vol. 4.<br />

Zhong, S., Khoshgoftaar, T., and Seliya, N. (2007). Clustering-based Network Intrusion<br />

Detection. International Journal of Reliability, Quality and Safety Engineering,<br />

14(2):169–187.<br />

196

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!