메뉴 건너뛰기




Volumn 35, Issue 2, 2005, Pages 302-312

Hierarchical Kohonenen Net for anomaly detection in network security

Author keywords

Computer network security; Neural network applications; Self organizing feature maps

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER CRIME; HIERARCHICAL SYSTEMS; MATHEMATICAL MODELS; NEURAL NETWORKS; PROBABILITY; SECURITY OF DATA; SECURITY SYSTEMS; SELF ORGANIZING MAPS; STATISTICAL METHODS;

EID: 17444432965     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2005.843274     Document Type: Article
Times cited : (201)

References (27)
  • 3
    • 17444386776 scopus 로고    scopus 로고
    • The Third International Knowledge Discovery and Data Mining Tools Competition
    • Online. Available:
    • S. Stolfo et al.. (2002) The Third International Knowledge Discovery and Data Mining Tools Competition. Online. Available: http://kdd.ics.uci.edu/databases/kddCup99/kddCup99.html
    • (2002)
    • Stolfo, S.1
  • 9
    • 9444243157 scopus 로고    scopus 로고
    • Hybrid Neural Networks for Intrusion Detection Systems
    • Online. Available
    • C. Jirapummin, N. Wattanapongsakorn, and P. Kanthamanon. Hybrid Neural Networks for Intrusion Detection Systems. Online. Available: http://dbvis.fmi.uni-konstanz-de/members/panse/seminar_ws0203/
    • Jirapummin, C.1    Wattanapongsakorn, N.2    Kanthamanon, P.3
  • 12
    • 0023294428 scopus 로고
    • "An intrusion-detection model"
    • Feb
    • D. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 14
    • 85019691440 scopus 로고    scopus 로고
    • "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory"
    • J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory," ACM Trans. Inform. Syst. Security, vol. 3, pp. 262-294, 2000.
    • (2000) ACM Trans. Inform. Syst. Security , vol.3 , pp. 262-294
    • McHugh, J.1
  • 16
    • 0036472459 scopus 로고    scopus 로고
    • "Anomaly detection in embedded systems"
    • Feb
    • R. A. Maxion and K. M. C. Tan, "Anomaly detection in embedded systems," IEEE Trans. Comput., vol. 51, no. 2, pp. 108-120, Feb. 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.2 , pp. 108-120
    • Maxion, R.A.1    Tan, K.M.C.2
  • 17
    • 0037252253 scopus 로고    scopus 로고
    • "Determining the operational limits of an anomaly-based intrusion detector"
    • Jan
    • K. M. C. Tan and R. A. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. Select. Areas Commun. vol. 21, no. 1, pp. 96-110, Jan. 2003.
    • (2003) IEEE J. Select. Areas Commun. , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.M.C.1    Maxion, R.A.2
  • 18
    • 0003410791 scopus 로고    scopus 로고
    • 3rd extended ed, ser. Information Sciences. Berlin, Germany: Springer
    • T. Kohonen, Self-Organizing Maps, 3rd extended ed, ser. Information Sciences. Berlin, Germany: Springer, 2001, vol. 30.
    • (2001) Self-Organizing Maps , vol.30
    • Kohonen, T.1
  • 20
    • 0037002475 scopus 로고    scopus 로고
    • "Intrusion detection: A brief history and overview"
    • Apr
    • R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and overview," Computer, vol. 35, no. 4, pp. 27-30, Apr. 2002.
    • (2002) Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 21
    • 0036588773 scopus 로고    scopus 로고
    • "Incorporating soft computing techniques into a probabilistic intrusion detection system"
    • May
    • S. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Syst., Man, Cybern., pt. C, vol. 32, no. 2, pp. 154-160, May 2002.
    • (2002) IEEE Trans. Syst., Man, Cybern. , vol.32 , Issue.2 PART C , pp. 154-160
    • Cho, S.1
  • 22
    • 0036647172 scopus 로고    scopus 로고
    • "Multivariate statistical analysis of audit trails for host-based intrusion detection"
    • Jul
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol. 51, no. 7, pp. 810-820, Jul. 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 23
    • 0037844902 scopus 로고    scopus 로고
    • "A self-organizing map for adaptive processing of structured data"
    • May
    • M. Hagenbuchner, A. Sperduti, and A. Tsoi, "A self-organizing map for adaptive processing of structured data," IEEE Trans. Neural Netw. vol. 14, no. 3, pp. 491-505, May 2003.
    • (2003) IEEE Trans. Neural Netw. , vol.14 , Issue.3 , pp. 491-505
    • Hagenbuchner, M.1    Sperduti, A.2    Tsoi, A.3
  • 24
    • 0036128861 scopus 로고    scopus 로고
    • "ViSOM - A novel method for multivariate data projection and structure visualization"
    • Jan
    • H. Yin, "ViSOM - A novel method for multivariate data projection and structure visualization," IEEE Trans. Neural Netw., vol. 13, no. 1, pp. 237-243, Jan. 2002.
    • (2002) IEEE Trans. Neural Netw. , vol.13 , Issue.1 , pp. 237-243
    • Yin, H.1
  • 25
    • 0036804085 scopus 로고    scopus 로고
    • "Network intrusion and fault detection: A statistical anomaly approach"
    • Oct
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Commun. Mag., vol. 40, no. 10, pp. 76-82, Oct. 2002.
    • (2002) IEEE Commun. Mag. , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 26
    • 1942436335 scopus 로고    scopus 로고
    • "Robustness of the Markov-chain model for cyber-attack detection"
    • Mar
    • N. Ye, Y. Zhang, and C. M. Borror, "Robustness of the Markov-chain model for cyber-attack detection," IEEE Trans. Rel., vol. 53, no. 1, pp. 116-123, Mar. 2004.
    • (2004) IEEE Trans. Rel. , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 27
    • 84943383590 scopus 로고    scopus 로고
    • "Identifying important features for intrusion detection using support vector machines and neural networks"
    • Jan
    • A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Proc. 2003 Symp. Applications and the Internet, Jan. 2003, pp. 209-216.
    • (2003) Proc. 2003 Symp. Applications and the Internet , pp. 209-216
    • Sung, A.H.1    Mukkamala, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.