CS

Resources Page

Lecture Notes

Some of the material in the notes were taken from textbooks and papers. It is not possible to cite them all here. Please use these files for educational purpose only and do not distribute them outside the class. Do not download and print all of them at once. They are being modified throughout the semester.

This is the only part of the site that is password protected. The instructor has created a username and password for the whole class. They will be given out during the first week of the class.

Link to Lecture Notes Page.

Link to Presentation Papers.

A. Papers Referenced in Lectures

  1. S. Forrest, S. A. Hofmeyr, A. Somayaji and T. A. Longstaff, "A sense of self for Unix processes," Proceedings 1996 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1996, pp. 120-128. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=502675&isnumber=10940.
  2. Dan Jurafsky and James H. Martin, "Speech and Language Processing, Ch. 3: Language Modeling with N-Grams," 3rd Ed. Draft, https://web.stanford.edu/~jurafsky/slp3/.
  3. Stuart Staniford-Chen and L. Todd Heberlein, “Holding Intruders Accountable on the Internet,” Proceedings 1995 IEEE Symposium on Security and Privacy, 1995, pp.39-49, 8-10 May 1995. https://ieeexplore.ieee.org/document/398921.
  4. Lindsay I. Smith, "A tutorial on Principal Components Analysis," Technical REport OUCS-2002-12, University of Otago, New Zealand. https://www.cs.otago.ac.nz/research/publications/OUCS-2002-12.pdf.
  5. Yung K.H., "Detecting Long Connection Chains of Interactive Terminal Sessions." In: Wespi A., Vigna G., Deri L. (eds) Recent Advances in Intrusion Detection. RAID 2002. Lecture Notes in Computer Science, vol 2516. Springer, Berlin, Heidelberg. https://link.springer.com/chapter/10.1007/3-540-36084-0_1.
  6. Tom Fawcett, "An introduction to ROC analysis", Pattern Recognition Letters 27 (2006) 861–874.
  7. Y. Zhong, H. Yamaki and H. Takakura, "A grid-based clustering for low-overhead anomaly intrusion detection," 2011 5th International Conference on Network and System Security, Milan, 2011, pp. 17-24.

B. Other Reference Papers

  1. P. García-Teodoro, J. Díaz-Verdejo, G. Maciá-Fernández, E. Vázquez, Anomaly-based network intrusion detection: Techniques, systems and challenges, Elsevier, Computers & Security, Volume 28, Issues 1–2, 2009, Pages 18-28. http://www.sciencedirect.com/science/article/pii/S0167404808000692.
  2. D. E. Denning, "An Intrusion-Detection Model," in IEEE Transactions on Software Engineering, vol. SE-13, no. 2, pp. 222-232, Feb. 1987. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=1702202&isnumber=35884.
  3. D. Wagner and R. Dean, "Intrusion detection via static analysis," Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, Oakland, CA, USA, 2001, pp. 156-168. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=924296&isnumber=19992.

 

 

 

 

 

About Us | Site Map | Privacy Policy | Contact Us | ©2014