메뉴 건너뛰기




Volumn 52, Issue 1, 2003, Pages 75-82

Computer intrusion detection through EWMA for autocorrelated and uncorrelated data

Author keywords

Anomaly detection; Computer audit data; Exponentially weighted moving average (EWMA); Information assurance; Intrusion detection

Indexed keywords

COMPUTER SYSTEMS; QUALITY OF SERVICE; SECURITY OF DATA;

EID: 0037333205     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2002.805796     Document Type: Article
Times cited : (119)

References (45)
  • 3
    • 0003347648 scopus 로고    scopus 로고
    • Detecting information warfare attacks: Current state of the art from a process control viewpoint
    • Aug.
    • N. Ye, J. Giordano, and J. Feldman, "Detecting information warfare attacks: Current state of the art from a process control viewpoint," Communications ACM, vol. 44, Aug. 2001.
    • (2001) Communications ACM , vol.44
    • Ye, N.1    Giordano, J.2    Feldman, J.3
  • 5
    • 0032158205 scopus 로고    scopus 로고
    • Applying software reliability engineering in the 1990s
    • Sept.
    • W. Everett, S. Keene, and A. Nikora, "Applying software reliability engineering in the 1990s," IEEE Trans. Rel., vol. 47, pp. 372-378, Sept. 1998.
    • (1998) IEEE Trans. Rel. , vol.47 , pp. 372-378
    • Everett, W.1    Keene, S.2    Nikora, A.3
  • 6
    • 0030379933 scopus 로고    scopus 로고
    • Analyze-NOW - An environment for collection and analysis of failures in a network of workstations
    • Dec.
    • A. Thakur and R. K. Iyer, "Analyze-NOW - An environment for collection and analysis of failures in a network of workstations," IEEE Trans. Rel., vol. 45, no. 4, pp. 561-570, Dec. 1996.
    • (1996) IEEE Trans. Rel. , vol.45 , Issue.4 , pp. 561-570
    • Thakur, A.1    Iyer, R.K.2
  • 7
    • 0031222502 scopus 로고    scopus 로고
    • Proactive network-fault detection
    • Sept.
    • C. S. Hood and C. Ji, "Proactive network-fault detection," IEEE Trans. Rel., vol. 46, no. 3, pp. 333-341, Sept. 1997.
    • (1997) IEEE Trans. Rel. , vol.46 , Issue.3 , pp. 333-341
    • Hood, C.S.1    Ji, C.2
  • 8
    • 0030379361 scopus 로고    scopus 로고
    • Assessment of fault-detection processes: An approach based on reliability techniques
    • Dec.
    • S. Morasca, "Assessment of fault-detection processes: An approach based on reliability techniques," IEEE Trans. Rel., vol. 45, no. 4, pp. 632-637, Dec. 1996.
    • (1996) IEEE Trans. Rel. , vol.45 , Issue.4 , pp. 632-637
    • Morasca, S.1
  • 9
    • 0029508948 scopus 로고
    • Optimal configuration of redundant real-time systems in the face of correlated failure
    • Dec.
    • C. M. Krishna, "Optimal configuration of redundant real-time systems in the face of correlated failure," IEEE Trans. Rel., vol. 44, no. 4, pp. 587-594, Dec. 1995.
    • (1995) IEEE Trans. Rel. , vol.44 , Issue.4 , pp. 587-594
    • Krishna, C.M.1
  • 10
    • 0032156812 scopus 로고    scopus 로고
    • Topological optimization of a reliable communication work
    • Sept.
    • S.-T. Cheng, "Topological optimization of a reliable communication work," IEEE Trans. Rel., vol. 47, no. 3, pp. 225-233, Sept. 1998.
    • (1998) IEEE Trans. Rel. , vol.47 , Issue.3 , pp. 225-233
    • Cheng, S.-T.1
  • 11
    • 0033309191 scopus 로고    scopus 로고
    • Design of a fault-tolerant COTS-based bus architecture
    • Dec.
    • S. N. Chau, L. Alkalai, A. T. Tai, and J. B. Burt, "Design of a fault-tolerant COTS-based bus architecture," IEEE Trans. Rel., vol. 48, no. 4, pp. 351-359, Dec. 1999.
    • (1999) IEEE Trans. Rel. , vol.48 , Issue.4 , pp. 351-359
    • Chau, S.N.1    Alkalai, L.2    Tai, A.T.3    Burt, J.B.4
  • 12
    • 0031347362 scopus 로고    scopus 로고
    • Optimal information-dispersal for increasing the reliability of a distributed service
    • Dec.
    • H.-M. Sun and S.-P. Shieh, "Optimal information-dispersal for increasing the reliability of a distributed service," IEEE Trans. Rel., vol. 46, no. 4, pp. 462-472, Dec. 1997.
    • (1997) IEEE Trans. Rel. , vol.46 , Issue.4 , pp. 462-472
    • Sun, H.-M.1    Shieh, S.-P.2
  • 13
    • 0033293396 scopus 로고    scopus 로고
    • Toward a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Computer Networks, vol. 31, pp. 805-822, 1999.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 14
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
    • IEEE Computer Society
    • R. Lippmann et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp. 12-25.
    • (2000) Proc. DARPA Inform. Survivability Conf. Exposition , pp. 12-25
    • Lippmann, R.1
  • 17
    • 0003518833 scopus 로고
    • Ph.D. dissertation, Department of Computer Science, Purdue University, Indiana, USA
    • S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. dissertation, Department of Computer Science, Purdue University, Indiana, USA, 1995.
    • (1995) Classification and Detection of Computer Intrusions
    • Kumar, S.1
  • 19
  • 21
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic techniques for intrusion detection based on computer audit data
    • N. Ye et al., "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, and Cybern., vol. 31, no. 4, 2001.
    • (2001) IEEE Trans. Syst., Man, and Cybern. , vol.31 , Issue.4
    • Ye, N.1
  • 24
    • 0012175262 scopus 로고    scopus 로고
    • Computer intrusion detection based on statistical distributions of distance metrics
    • N. Ye, Q. Chen, and S. M. Emran, "Computer intrusion detection based on statistical distributions of distance metrics," in Proc. Southern Conf. Computing, 2000.
    • (2000) Proc. Southern Conf. Computing
    • Ye, N.1    Chen, Q.2    Emran, S.M.3
  • 28
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems
    • Mar./Apr.
    • N. Ye and Q. Chen, "An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems," Qual. Rel. Eng. Int., vol. 17, no. 2, pp. 105-112, Mar./Apr. 2001.
    • (2001) Qual. Rel. Eng. Int. , vol.17 , Issue.2 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 29
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. 13, no. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 32
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • IEEE Computer Society
    • C. Ko, G. Fink, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. 1997 IEEE Symp. Security and Privacy: IEEE Computer Society, 1997, pp. 134-144.
    • (1997) Proc. 1997 IEEE Symp. Security and Privacy , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 34
    • 0004118981 scopus 로고
    • The NIDES statistical component description of justification
    • H. S. Javitz and A. Valdes, "The NIDES statistical component description of justification," SRI International, Tech. Rep. A010, 1994.
    • (1994) SRI International, Tech. Rep. , vol.A010
    • Javitz, H.S.1    Valdes, A.2
  • 35
    • 84962306569 scopus 로고    scopus 로고
    • Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
    • IEEE Computer Society
    • Y. Jou et al., "Design and implementation of a scalable intrusion detection system for the protection of network infrastructure," in Proc. DARPA Inform. Survivability Conf. Exposition: IEEE Computer Society, 2000, pp. 69-83.
    • (2000) Proc. DARPA Inform. Survivability Conf. Exposition , pp. 69-83
    • Jou, Y.1
  • 38
    • 0000669122 scopus 로고
    • The exponentially weighted moving average
    • J. S. Hunter, "The exponentially weighted moving average," J. Qual. Technol., vol. 18, pp. 203-209, 1986.
    • (1986) J. Qual. Technol. , vol.18 , pp. 203-209
    • Hunter, J.S.1
  • 39
    • 84946637626 scopus 로고
    • Control chart tests based on geometric moving averages
    • S. W. Roberts, "Control chart tests based on geometric moving averages," Technometrics, vol. 1, pp. 239-251, 1959.
    • (1959) Technometrics , vol.1 , pp. 239-251
    • Roberts, S.W.1
  • 40
    • 0000002118 scopus 로고
    • Some statistical process control methods for autocorrelated data
    • July
    • D. C. Montgomery and C. M. Mastrangelo, "Some statistical process control methods for autocorrelated data," J. Qual. Technol., vol. 23, no. 3, pp. 179-193, July 1991.
    • (1991) J. Qual. Technol. , vol.23 , Issue.3 , pp. 179-193
    • Montgomery, D.C.1    Mastrangelo, C.M.2
  • 41
    • 0033154342 scopus 로고    scopus 로고
    • Robustness of the EWMA control charts to nonnormality
    • C. M. Borror, D. C. Montgomery, and C. G. Runger, "Robustness of the EWMA control charts to nonnormality," J. Qual. Technol., vol. 31, no. 3, pp. 309-316, 1999.
    • (1999) J. Qual. Technol. , vol.31 , Issue.3 , pp. 309-316
    • Borror, C.M.1    Montgomery, D.C.2    Runger, C.G.3
  • 42
    • 0032761123 scopus 로고    scopus 로고
    • EWMA control charts with time-varying control limits and fast initial response
    • S. H. Steiner, "EWMA control charts with time-varying control limits and fast initial response," J. Qual. Technol., vol. 31, no. 1, pp. 75-86, 1999.
    • (1999) J. Qual. Technol. , vol.31 , Issue.1 , pp. 75-86
    • Steiner, S.H.1
  • 43
    • 0001050563 scopus 로고
    • The exponentially weighted moving variance
    • J. F. MacGregor and T. J. Harris, "The exponentially weighted moving variance," J. Qual. Technol., vol. 25, no. 1, pp. 106-118, 1993.
    • (1993) J. Qual. Technol. , vol.25 , Issue.1 , pp. 106-118
    • MacGregor, J.F.1    Harris, T.J.2
  • 44
    • 0030819313 scopus 로고    scopus 로고
    • Designing a multivariate EWMA control chart
    • Jan.
    • S. S. Prabhu and G. C. Runger, "Designing a multivariate EWMA control chart," J. Qual. Technol., vol. 29, no. 1, pp. 8-15, Jan. 1997.
    • (1997) J. Qual. Technol. , vol.29 , Issue.1 , pp. 8-15
    • Prabhu, S.S.1    Runger, G.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.