메뉴 건너뛰기




Volumn , Issue , 2004, Pages 363-368

Data stream mining architecture for network intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA PROCESSING; DECISION MAKING; ELECTRONIC CRIME COUNTERMEASURES; LAWS AND LEGISLATION; ONLINE SYSTEMS; PROBABILISTIC LOGICS; REAL TIME SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 16244390893     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (25)
  • 1
    • 0036367429 scopus 로고    scopus 로고
    • Querying and mining data streams: You only get one look
    • Wisconsin, June
    • M. Garofalakis, J. Gehrke, and R. Rastogi, "Querying and Mining Data Streams: You Only Get One Look", Proc. of ACM SIGMOD Tutorial, Wisconsin, pp.635, June 2002.
    • (2002) Proc. of ACM SIGMOD Tutorial , pp. 635
    • Garofalakis, M.1    Gehrke, J.2    Rastogi, R.3
  • 2
    • 2442617843 scopus 로고    scopus 로고
    • Issues in data stream management
    • June
    • L. Golab, and M.T. Ozsu, "Issues in Data Stream Management," SIGMOD Record, Vol.32, No.2, pp.5-14, June 2003.
    • (2003) SIGMOD Record , vol.32 , Issue.2 , pp. 5-14
    • Golab, L.1    Ozsu, M.T.2
  • 4
    • 16244392017 scopus 로고    scopus 로고
    • Mining frequent patterns in data streams at multiple time granularities
    • H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), AAAI/MIT Press
    • C. Giannella, J.Han, J. Pei, X. Yan, and P. Yu, "Mining Frequent Patterns in Data Streams at Multiple Time Granularities", H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), Data Mining: Next Generation Challenges and Future Directions, AAAI/MIT Press, 2003.
    • (2003) Data Mining: next Generation Challenges and Future Directions
    • Giannella, C.1    Han, J.2    Pei, J.3    Yan, X.4    Yu, P.5
  • 5
    • 0013114810 scopus 로고    scopus 로고
    • Mining in a data-flow environment: Experience in network intrusion detection
    • Aug.
    • L. Wenke, J. Salvatore, and Mok, K., "Mining in a Data-flow Environment: Experience in Network Intrusion Detection", Proc. of ACM-KDD, pp. 114-124, Aug.1999.
    • (1999) Proc. of ACM-KDD , pp. 114-124
    • Wenke, L.1    Salvatore, J.2    Mok, K.3
  • 6
    • 0039253846 scopus 로고    scopus 로고
    • Mining frequent patterns without candidate generation
    • J. Han, J. Pei, and Y. Yin. "Mining Frequent Patterns without Candidate Generation", Proc. ACM SIGMOD, pp.1-12, 2000.
    • (2000) Proc. ACM SIGMOD , pp. 1-12
    • Han, J.1    Pei, J.2    Yin, Y.3
  • 8
    • 16244406137 scopus 로고    scopus 로고
    • Network intrusion detection signatures
    • September
    • K. Kent Frederick, "Network Intrusion Detection Signatures", Security in Focus, September 2001, Available online at: http://www. securityfocus.com/infocus/1623
    • (2001) Security in Focus
    • Frederick, K.K.1
  • 9
    • 0003466371 scopus 로고
    • Internet protocol
    • Information Sciences Institute, September
    • RFC 791, Internet Protocol, Information Sciences Institute, September 1981, Available online at: http://www.rfc-editor.org/
    • (1981) RFC , vol.791
  • 10
    • 2542419686 scopus 로고
    • Transmission control protocol
    • Information Sciences Institute, September
    • RFC 793, Transmission Control Protocol, Information Sciences Institute, September 1981, Available online at: http://www.rfc-editor.org/
    • (1981) RFC , vol.793
  • 13
    • 35448931869 scopus 로고    scopus 로고
    • Discovering generalized episodes using minimal occurrences
    • Aug.
    • H. Mannila, and H. Toivonen, "Discovering Generalized Episodes using Minimal Occurrences", Proc. ACM-KDD, pp.146-151, Aug. 1996.
    • (1996) Proc. ACM-KDD , pp. 146-151
    • Mannila, H.1    Toivonen, H.2
  • 14
    • 16244362276 scopus 로고    scopus 로고
    • Symantec Corporation, "Security Response: Attack Signatures", Available Online at: http://securityresponse.symantec.com/avcenter/nis_ids/
    • Security Response: Attack Signatures
  • 16
    • 0027621699 scopus 로고
    • Mining association rules between sets of items in large datasets
    • R. Agrawal, T. Imilienski, and A. Swami, "Mining Association Rules Between Sets of Items in Large Datasets", Proc. of ACM SIGMOD, pp.207-216, 1993.
    • (1993) Proc. of ACM SIGMOD , pp. 207-216
    • Agrawal, R.1    Imilienski, T.2    Swami, A.3
  • 17
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detection
    • H.Debar, L.Me and F. Wu (Eds.), LNCS 1907, Springer-Verlag
    • A. Valdes and K. Skinner, "Adaptive, Model-Based Monitoring for Cyber Attack Detection", Proc. of RAID, H.Debar, L.Me and F. Wu (Eds.), LNCS 1907, Springer-Verlag, pp. 80-92, 2000.
    • (2000) Proc. of RAID , pp. 80-92
    • Valdes, A.1    Skinner, K.2
  • 21
    • 0038633423 scopus 로고    scopus 로고
    • Clustering data streams: Theory and practice
    • Sudipto Guha, et al, "Clustering Data Streams: Theory and Practice", IEEE TKDE, Vol.15, No. 3, pp. 515-528, 2003.
    • (2003) IEEE TKDE , vol.15 , Issue.3 , pp. 515-528
    • Guha, S.1
  • 22
    • 16244381051 scopus 로고    scopus 로고
    • Mining dynamics of data streams in multidimensional space
    • Japan, Dec.
    • J. Han, "Mining Dynamics of Data Streams in Multidimensional Space", Proc. of IEEE ICDM Keynote Speech, Japan, Dec. 2002.
    • (2002) Proc. of IEEE ICDM Keynote Speech
    • Han, J.1
  • 23
    • 4544306385 scopus 로고    scopus 로고
    • Online mining of changes from data streams: Research problems and preliminary results
    • San Diego, CA
    • G. Dong, J. Han, L. Lakshmanan, J. Pei, H. Wang and Philip Yu, "Online Mining of changes from Data Streams: Research Problems and Preliminary Results", Proc. of ACM SIGMOD MPDS, San Diego, CA, 2003.
    • (2003) Proc. of ACM SIGMOD MPDS
    • Dong, G.1    Han, J.2    Lakshmanan, L.3    Pei, J.4    Wang, H.5    Yu, P.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.