메뉴 건너뛰기




Volumn 1, Issue , 2004, Pages 412-419

Unsupervised learning techniques for an intrusion detection system

Author keywords

Anomaly detection; Intrusion detection; K means; Principal direction divisive partitioning; Quality of clusters; Self organizing maps; Unsupervised clustering

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; DATA MINING; PATTERN MATCHING; PROBLEM SOLVING; SECURITY OF DATA; SELF ORGANIZING MAPS;

EID: 2442526701     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/967900.967988     Document Type: Conference Paper
Times cited : (194)

References (33)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • J. P. Anderson Co., Ft. Washington, Pennsylvania, Apr
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, J. P. Anderson Co., Ft. Washington, Pennsylvania, Apr 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 2
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • T. Bass. Intrusion detection systems and multisensor data fusion. Comm. of the ACM, 43(4):99-105, 2000.
    • (2000) Comm. of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 6
    • 0003200953 scopus 로고
    • Artificial intelligence and intrusion detection: Current and future directions
    • Baltimore, MD
    • J. Frank. Artificial intelligence and intrusion detection: Current and future directions. In Proc. of the 17th Nat'l Computer Security Conf., Baltimore, MD, 1994.
    • (1994) Proc. of the 17th Nat'l Computer Security Conf.
    • Frank, J.1
  • 15
    • 0003410791 scopus 로고    scopus 로고
    • Springer-Verlag, Berling, 3 edition
    • T. Kohonen. Self-Organizing Maps. Springer-Verlag, Berling, 3 edition, 2001.
    • (2001) Self-organizing Maps
    • Kohonen, T.1
  • 16
    • 2442537609 scopus 로고    scopus 로고
    • NSOM: A real-time network-based intrusion detection system using self-organizing maps
    • Dept. of Applied Science, University of California, Davis
    • K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002.
    • (2002) Technical Report
    • Labib, K.1    Vemuri, R.2
  • 17
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • T. Lane and C. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. on Information and System Security, 2(3):295-331, 1999.
    • (1999) ACM Trans. on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.2
  • 20
    • 0013114810 scopus 로고    scopus 로고
    • Mining in a data-flow environment: Experience in network intrusion detection
    • S. Chaudhuri and D. Madigan, editors
    • W. Lee, S. Stolfo, and K. Mok. Mining in a data-flow environment: Experience in network intrusion detection. In S. Chaudhuri and D. Madigan, editors, Proc. of the 5th Int'l Conf. on Knowledge Discovery and Data Mining, pages 114-124, 1999.
    • (1999) Proc. of the 5th Int'l Conf. on Knowledge Discovery and Data Mining , pp. 114-124
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 21
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • E. A. Levy. Smashing the stack for fun and profit. Phrack magazine, 7(49), Nov 1996.
    • (1996) Phrack Magazine , vol.7 , Issue.49
    • Levy, E.A.1
  • 24
    • 0344008570 scopus 로고    scopus 로고
    • Detecting novel attacks by identifying anomalous network packet headers
    • Florida Institute of Technology
    • M. Mahoney and P. Chan. Detecting novel attacks by identifying anomalous network packet headers. Technical Report CS-2001-2, Florida Institute of Technology, 2001.
    • (2001) Technical Report , vol.CS-2001-2
    • Mahoney, M.1    Chan, P.2
  • 25
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. on Information and System Security, 3(4):262-294, 2000.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 27
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Calgary, Canada
    • T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection, Technical Report T2R-0Y6, Secure Networks, Calgary, Canada, 1998.
    • (1998) Technical Report , vol.T2R-0Y6
    • Ptacek, T.H.1    Newsham, T.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.