메뉴 건너뛰기




Volumn , Issue , 2002, Pages 376-385

Learning nonstationary models of normal network traffic for detecting novel attacks

Author keywords

[No Author keywords available]

Indexed keywords

DATA STRUCTURES; LEARNING ALGORITHMS; NETWORK PROTOCOLS; PROBABILITY DISTRIBUTIONS; TELECOMMUNICATION TRAFFIC;

EID: 0242456801     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775094.775102     Document Type: Conference Paper
Times cited : (232)

References (18)
  • 1
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)
    • Computer Science Laboratory SRI-CSL 95-06 May
    • Anderson, Debra, Teresa F. Lunt, Harold Javitz, Ann Tamaru, Alfonso Valdes, "Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES)", Computer Science Laboratory SRI-CSL 95-06 May 1995. http://www.sdl.sri.com/papers/5/s/5sri/5sri.pdf
    • (1995)
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 2
    • 0024924360 scopus 로고
    • Modeling for text compression
    • Dec.
    • Bell, Timothy, Ian H. Witten, John G. Cleary, "Modeling for Text Compression", ACM Computing Surveys 21(4), pp. 557-591, Dec. 1989.
    • (1989) ACM Computing Surveys , vol.21 , Issue.4 , pp. 557-591
    • Bell, T.1    Witten, I.H.2    Cleary, J.G.3
  • 4
    • 0035416013 scopus 로고    scopus 로고
    • Difficulties in simulating the internet
    • Aug.
    • Floyd, S. and V. Paxson, "Difficulties in Simulating the Internet." IEEE/ACM Transactions on Networking Vol. 9, no. 4, pp. 392-403, Aug. 2001. http://www.icir.org/vern/papers.html
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.4 , pp. 392-403
    • Floyd, S.1    Paxson, V.2
  • 7
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • M. Handley, C. Kreibich and V. Paxson, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics", Proc. USENIX Security Symposium, 2001.
    • Proc. USENIX Security Symposium, 2001
    • Handley, M.1    Kreibich, C.2    Paxson, V.3
  • 8
    • 0004204715 scopus 로고    scopus 로고
    • A database of computer attacks for the evaluation of intrusion detection systems
    • Masters Thesis, MIT
    • Kendall, Kristopher, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems", Masters Thesis, MIT, 1999.
    • (1999)
    • Kendall, K.1
  • 9
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1
  • 10
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet header anomaly detection for identifying hostile network traffic
    • Florida Tech. technical report 2001-04
    • Mahoney, M., P. K. Chan, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic", Florida Tech. technical report 2001-04, http://cs.fit.edu/~tr/
    • Mahoney, M.1    Chan, P.K.2
  • 14
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • January
    • Ptacek, Thomas H., and Timothy N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", January, 1998, http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html
    • (1998)
    • Ptacek, T.H.1    Newsham, T.N.2
  • 16
    • 80052381144 scopus 로고    scopus 로고
    • A strict anomaly detection model for IDS
    • Sasha/Beetle
    • Sasha/Beetle, "A Strict Anomaly Detection Model for IDS", Phrack 56(11), 2000, http://www.phrack.org
    • (2000) Phrack , vol.56 , Issue.11
  • 18
    • 0242698154 scopus 로고    scopus 로고
    • SPADE, Silicon Defense
    • SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.