List of Papers Under Consideration
See course homepage for papers selected to date.
Intrusion Detection
For a quick background on intrusion detection, see:
Stefan Axelsson,
Intrusion Detection Systems: A Taxomomy and Survey,
Technical Report No 99-15, Dept. of Computer Engineering,
Chalmers University of Technology, Sweden, March 2000.
Papers:
-
http://www.zurich.ibm.com/pub/Other/RAID/Prog_RAID98/Table_of_content.html
-
A
Intrusion Detection in Real-Time Database Systems via Time
Signatures
Victor C. S. Lee, City University of Hong Kong
John A. Stankovic and Sang H. Son , University of Virginia
Proceedings of the Sixth IEEE Real Time Technology and Applications
Symposium (RTAS 200
-
http://www.mitre.org/support/papers/tech_papers_01/bloedorn_datamining/index.shtml
Clustering
-
- Intrusion detection with unlabeled data using clustering
Leonid Portnoy, Elezar Eskin, Sal Stolfo
Workshop on Data Mining for Security ApplicationsIntrusion detection with unlabeled data using clustering
Leonid Portnoy, Elezar Eskin, Sal Stolfo
Workshop on Data Mining for Security Applications
Analysis
-
"Data Mining Methods for Detection of New Malicious Executables"
http://www.cs.columbia.edu/ids/publications/binaryeval-ieeesp01.pdf
-
Christoph Michael, Anup K. Ghosh:
Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. 66-79
http://link.springer.de/link/service/series/0558/bibs/1907/19070066.htm
-
Anup K. Ghosh, Aaron Schwartzbard: Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. 19-32
-
DBSec'99
Ravi Mukkamala, Jason Gagnon, Sushil Jajodia: Integrating Data Mining Techniques with Intrusion Detection Methods. 33-46
Suggestion from Murat Kantarcioglu:
Finding Interesting Associations without Support Pruning
Cohen, Datar, Fujiwara, Gionis, Indyk, Motwani, Ullman, Yang
Preventing Inference
-
-
Chris Clifton and
Don Marks,
``Security and Privacy Implications of Data Mining'',
ACM
SIGMOD
Workshop
on Data Mining and Knowledge Discovery,
Montreal, Canada, June 2, 1996.
-
T. D. Johnsten and V. V. Raghavan.
Impact of decision-region based classification mining algorithms on database security.
In V. Atluri and J. Hale, editors, Research Advances in Database and Information Systems Security, pages 171--191. Kluwer Academic, Norwell, MA, 2000.
DBSec'01:
Security Procedures for Classification Mining Algorithms Tom Johnsten, Vijay V. Raghavan
- Clifton, JCS
Other
- Incremental Clustering and Dynamic Information Retrieval
Moses Charikar, Chandra Chekuri, Tomas Feder, Rajeev Motwani
-
Incremental Document Clustering for Web Page Classification.
Wai-chiu Wong Adsa Wai-chee Fu
- Multi-Topic E-mail Authorship Attribution Forensics
O. de Vel, A. Anderson, M. Corney, G. Mohay
Workshop on Data Mining for Security Applications
-
Brodley/Lane profiling users based on command histories.
-
Hale's papers:
http://www.mcs.utulsa.edu/~hale/papers.html