Mutual Information Applied to Anomaly Detection |
Kopylova, Yuliya
(University of South Carolina)
Buell, Duncan A. (University of South Carolina) Huang, Chin-Tser (University of South Carolina) Janies, Jeff (University of South Carolina) |
1 | D. A. Buell, 'Calibrating entropy functions applied to computer networks,' in Proc. the Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, St. Petersburg, Russia, 2005 |
2 | A. Golan and J. Perloff, 'Comparison of maximum entropy and higherorder entropy estimator,' Journal of Econometrics, vol. 107, no. 1, pp. 195-211, 2002 DOI ScienceOn |
3 | V. Gudkov and S. Nussinov, 'Graph equivalence and characterization via a continuous evolution of a physical analog,' eprint arXiv:condmat/ 0209112, 2002 |
4 | M. Liljenstam, D. Nicol, V. Berk, and R. Gray, 'Simulating realistic network worm traffic for worm warning system design and testing,' in Proc. 2003 ACM workshop on Rapid Malcode (WORM'03), Washington DC, USA, Oct. 2003 |
5 | G. Helmer, J. Wong, V. Honavar, and L. Miller, 'Automated discovery of concise predictive rules for intrusion detection,' Technical Report 99-01, Iowa State Univ., Ames, USA, 2000 |
6 | I. Kojadinovic, 'On the use of mutual information in data analysis: An overview,' in Proc. Conference International Symposium on Applied Stochastic Models and Data Analysis, Brest, France, May 2005 |
7 | W. Lee and D. Xiang, 'Information-theoretic measures for anomaly detection,' in Proc. 2001 IEEE Symp. Security and Privacy, Oakland, CA, 2001, pp. 130-143 |
8 | H.Manilla, H. Toivonen and A. Verkamo, 'Discovery of frequent episodes in event sequences,' Data Mining and Knowledge Discovery., Netherlands, vol. 1, pp. 259-289, 1997 |
9 | T. Brugger, 'Data mining methods for network intrusion detection,' Ph.D. Dissertation, University of California, Davis, USA, June 2004 |
10 | J. Kurose and K. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 3rd Ed. PearsonEducation, Inc., 2005 |
11 | V. Gudkov, S. Nussinov and Z. Nussinov, 'A novel approach applied to the largest clique problem,' eprint arXiv:cond-mat/0209419, 2002 |
12 | K. Zyczkowski, 'Rényi Extrapolation of Shannon Entropy,' Open Syst. Inf. Dyn., Netherlands, vol. 10, pp. 297-310, 2003 DOI ScienceOn |
13 | J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, 'State of the practice of intrusion detection technologies,' Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, Carnegie Mellon, USA, 2000 |
14 | S. Axelsson, 'A preliminary attempt to apply detection and estimation theory to intrusion detection,' Technical Report 00-4, Chalmers Univ. of Technology, Goteborg, Sweden, 2000 |
15 | W. Lee, 'A data mining framework for constructing features and models for intrusion detection systems, ' Ph.D. Thesis, Columbia Univ., New York, USA, 1999 |