REFERENCES
- Leonid Portnoy, Intrusion Detection with unlabeled data using clustering [email protected]
- Mukherjee B, Heberlein L T & Leviet K N, Network Intrusion Detection, IEEE Network, 8(3), May/June 1994, pp 26–41.
- Parimal Kumar & Akhila Sinha - Survey of Intrusion Detection Systems and Security Audit Analysis, International conference on Quality, Reliability and Information Technology, 21–23 December 2000, New Delhi
- Roesch, M Snort - Lightweight Intrusion Detection for Networks, Proceedings of the 1999 USENIX LISA Conference November 1999, http://www.snort.org
- Biswaroop Guha, Biswanath Mukherjee, Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions, IEEE Network, July/ August 1997, pp 40–48
- Nittida Nuansri, Samar Singh & Tharam S Dillon, A Process State-Transition and its Application to Intrusion Detection, Dept of Computer Science and Computer Engg and Applied Computing Research Institute (ACRI), Bundoora VIC 3083, Melbourne, Australia.
- S Staniford-Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, C Wee, R Yip & D Zerkle, GrIDS—A Graph Based Intrusion detection System for Large Networks, DARPA contract DOD/DABT 63-93-C-0045, e-mail: <lastname>@cs.ucdavis.edu
- Stuart Staniford, James A Hoagland & Joseph M McAlerney, Practical Automated Detection of Stealthy Port-scans, www.silicondefense.com/spice/
- Ramesh Agarwal & Mahesh V Joshi, Pnrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection”, [email protected]. [email protected]
- www.sans.org/network/resources.
- The Art of Port Scanning, Fydoor ([email protected])
- Remote OS detection via TCP/IP Stack Fingerprinting, Fydoor, www.insecure.org
- Richard A Johnson, Dean & W Wichern, Applied Multivariate Statistical Analysis, pp 573–627, Prentice Hall of India.
- Parimal Kumar, MTech Project Report, Clustering Methods for Detecting Port-scans, May 2001, Department Of Computer Science & Engineering, IIT Delhi