TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Testing and evaluating computer intrusion detection systems
Communications of the ACM
The 1999 DARPA off-line intrusion detection evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Computer Networks
Cover story: dragon claws its way to the top
Network Computing
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
Generalized Additive Models (Texts in Statistical Science)
Generalized Additive Models (Texts in Statistical Science)
SVM approach with CTNT to detect DDoS attacks in grid computing
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Hi-index | 0.00 |
This paper suggests a method to check whether the real network dataset and modeling dataset for real network has statistically similar characteristics. The method we adopt in this paper is a Generalized Additive Model. By using this method, we show how similar the MIT/LL Dataset and the KDD CUP 99' Dataset are regarding their characteristics. It provided reasonable outcome for us to confirm that MIT/LL Dataset and KDD Cup Dataset are not statistically similar.