메뉴 건너뛰기




Volumn , Issue , 2005, Pages 55-62

Handling nominal features in anomaly intrusion detection problems

Author keywords

Anomaly detection; Indicator variables; Intrusion detection; Multiple correspondence analysis; Nominal features; Principal component classifier

Indexed keywords

ANOMALY DETECTION METHODS; DATA STREAMS; INTRUSION DETECTION; PRINCIPAL COMPONENT CLASSIFIERS (PCC);

EID: 27144530995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (55)

References (27)
  • 1
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the statistical component of the Next-Generation Intrusion Detection Expert System (NIDES)
    • Computer Science Laboratory, SRI International
    • D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes. Detecting Unusual Program Behavior Using the Statistical Component of the Next-Generation Intrusion Detection Expert System (NIDES). Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, 1995.
    • (1995) Technical Report SRI-CSL-95-06
    • Anderson, D.1    Lunt, T.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 7
    • 84861255899 scopus 로고    scopus 로고
    • IANA:Internet Assigned Number Authority. http://www.iana.org.
  • 11
    • 0141723181 scopus 로고    scopus 로고
    • KDD99. KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
    • KDD Cup 1999 Data.
  • 12
    • 0142095451 scopus 로고    scopus 로고
    • NSOM: A real-time network-based intrusion detection system using self-organizing maps
    • submitted
    • K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Networks Security, submitted, 2002.
    • (2002) Networks Security
    • Labib, K.1    Vemuri, R.2
  • 13
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S. Stolfo. A framework for constructing features and models for intrusion detection systems. Transactions on Information and System Security, 3(4):227-261, 2000.
    • (2000) Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 15
    • 0142063407 scopus 로고    scopus 로고
    • Novelty detection: A review part 1: Statistical approaches
    • Dec.
    • M. Markou and S. Singh. Novelty detection: A review part 1: Statistical approaches. Signal Processing, 83(12):2481-2497, Dec. 2003.
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2481-2497
    • Markou, M.1    Singh, S.2
  • 16
    • 0142126712 scopus 로고    scopus 로고
    • Novelty detection: A review part 2: Neural network-based approaches
    • Dec.
    • M. Markou and S. Singh. Novelty detection: A review part 2: Neural network-based approaches. Signal Processing, 83(12):2499-2521, Dec. 2003.
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2499-2521
    • Markou, M.1    Singh, S.2
  • 20
    • 0003260777 scopus 로고
    • Transmission control protocol - DARPA internet program protocol specification
    • STD 7, USC/Information Sciences Institute, September
    • J. Postel. Transmission Control Protocol - DARPA Internet Program Protocol Specification. STD 7, RFC 793, USC/Information Sciences Institute, September 1981.
    • (1981) RFC , vol.793
    • Postel, J.1
  • 21
    • 85090433665 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detecion for networks
    • Nov
    • M. Roesch. Snort - lightweight intrusion detecion for networks. In Proceedings of USENIX LISA, Nov 1999.
    • (1999) Proceedings of USENIX LISA
    • Roesch, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.