메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 192-205

IDS False alarm reduction using continuous and discontinuous patterns

Author keywords

Alarm reduction; Intrusion detection; Sequential patterns

Indexed keywords

ALARM SYSTEMS; ALGORITHMS; COMPUTER NETWORKS; DATA REDUCTION;

EID: 26444495635     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_14     Document Type: Conference Paper
Times cited : (43)

References (22)
  • 5
    • 0026154682 scopus 로고
    • The SRI IDES statistical anomaly detector
    • Oakland, CA. SRI International. (May)
    • Javitz, H. S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In IEEE Symposium on Security and Privacy, Oakland, CA. SRI International. (May 1991)
    • (1991) IEEE Symposium on Security and Privacy
    • Javitz, H.S.1    Valdes, A.2
  • 6
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • Yihua, L., Vemuri, V. R.: Use of K-Nearest Neighbor classifier for intrusion detection. Computers & Security 21(5). (2002) 439-448
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 439-448
    • Yihua, L.1    Vemuri, V.R.2
  • 8
    • 0033295259 scopus 로고    scopus 로고
    • A system for detecting network intruders in real-time
    • Paxson, V., Bro,: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24). (1999) 2435-2463
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1    Bro2
  • 10
    • 0036643492 scopus 로고    scopus 로고
    • Mining hybrid sequential patterns and sequential rules
    • Yen-Liang, C., Shih-Sheng, C., Ping-Yu H.: Mining hybrid sequential patterns and sequential rules. Information Systems V 27, 5. (2002) 345-362
    • (2002) Information Systems , vol.27 , Issue.5 , pp. 345-362
    • Yen-Liang, C.1    Shih-Sheng, C.2    Ping-Yu, H.3
  • 12
    • 0032028932 scopus 로고    scopus 로고
    • Efficient data mining for path traversal patterns
    • Chen, M.S., Park, J.S., Yu, P.S.: Efficient data mining for path traversal patterns, IEEE Trans Knowledge Data Eng, 10(2). (1998) 209-221
    • (1998) IEEE Trans Knowledge Data Eng , vol.10 , Issue.2 , pp. 209-221
    • Chen, M.S.1    Park, J.S.2    Yu, P.S.3
  • 14
    • 84883393843 scopus 로고    scopus 로고
    • DARPA Dataset: http://www.ll.mit.edu/IST/ideval/
    • DARPA Dataset
  • 15
    • 26444588073 scopus 로고    scopus 로고
    • Snort: http://www.snort.org/
  • 16
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection system for networks
    • Roesch, M.: Snort - lightweight intrusion detection system for networks. In: Proceedings of USENIX LISA'99. (1999)
    • (1999) Proceedings of USENIX LISA'99
    • Roesch, M.1
  • 20
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W., Stolfo, S. J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4). (2000) 227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.