메뉴 건너뛰기




Volumn 3687, Issue PART II, 2005, Pages 94-102

Using behavior knowledge space and temporal information for detecting intrusions in computer networks

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); COMPUTER NETWORKS; DATABASE SYSTEMS; KNOWLEDGE BASED SYSTEMS; PROBLEM SOLVING; RELIABILITY; TELECOMMUNICATION TRAFFIC; INTRUSION DETECTION; RELIABILITY ANALYSIS;

EID: 27244444920     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11552499_11     Document Type: Conference Paper
Times cited : (3)

References (23)
  • 1
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network based intrusion detection system
    • G. Vigna, R. Kemmerer, "Netstat: a network based intrusion detection system", Journal of Computer Security, vol. 7, no. 1, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2
  • 4
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • Aug. 26-29 , Washington DC
    • A.K. Ghosh, A. Schwartzbard, "A Study in Using Neural Networks for Anomaly and Misuse Detection", Proc. 8'th USENIX Security Symposium, Aug. 26-29 1999, Washington DC.
    • (1999) Proc. 8'th USENIX Security Symposium
    • Ghosh, A.K.1    Schwartzbard, A.2
  • 5
    • 77949731575 scopus 로고    scopus 로고
    • Temporal Sequence learning and data reduction for anomaly detection
    • T. Lane, C.E. Brodley, "Temporal Sequence learning and data reduction for anomaly detection", ACM Trans, on Inform, and System Security, vol. 2, no. 3, pp. 295-261, 1999.
    • (1999) ACM Trans, on Inform, and System Security , vol.2 , Issue.3 , pp. 295-1261
    • Lane, T.1    Brodley, C.E.2
  • 6
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, S.J. Stolfo, "A framework for constructing features and models for intrusion detection systems", ACM Transactions on Inform. System Security, vol. 3, no. 4, pp. 227-261, 2000.
    • (2000) ACM Transactions on Inform. System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 8
    • 0035402096 scopus 로고    scopus 로고
    • Training a neural Network based intrusion detector to recognize novel attack
    • S. C. Lee, D.V. Heinbuch, "Training a neural Network based intrusion detector to recognize novel attack", IEEE Trans. Syst, Man., and Cybernetic, Part-A, vol. 31, pp. 294-299, 2001.
    • (2001) IEEE Trans. Syst, Man., and Cybernetic, Part-A , vol.31 , pp. 294-299
    • Lee, S.C.1    Heinbuch, D.V.2
  • 10
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • G. Giacinto, F. Roli, L. Didaci, "Fusion of multiple classifiers for intrusion detection in computer networks", Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 11
    • 27244444099 scopus 로고    scopus 로고
    • A modular multiple classifier system for the detection of intrusions
    • G. Giacinto, F. Roli, L. Didaci, "A Modular Multiple Classifier System for the Detection of Intrusions", Lecture Notes in Computer Science vol. 2709, pp. 346-355, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2709 , pp. 346-355
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 12
    • 27244448490 scopus 로고    scopus 로고
    • Network intrusion detection by a multi stage classification system
    • Springer, Berlin
    • L. P. Cordella, A. Limongiello, C. Sansone, "Network Intrusion Detection by a Multi Stage Classification System", Lecture Notes in Computer Science vol. 3077, Springer, Berlin, pp. 324-333, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3077 , pp. 324-333
    • Cordella, L.P.1    Limongiello, A.2    Sansone, C.3
  • 13
    • 0142126712 scopus 로고    scopus 로고
    • Novelty detection: A review - Part 2: Neural network based approaches
    • S. Singh, M. Markou, Novelty detection: a review - part 2: neural network based approaches, Signal Processing, vol. 83, no. 12, pp. 2499-2521, 2003.
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2499-2521
    • Singh, S.1    Markou, M.2
  • 14
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • M. Jordan et al., Eds., Cambridge, MA: MIT Press
    • J. Ryan, M.J. Lin, R. Miikkulainen, Intrusion detection with neural networks, in Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, pp. 943-949, 1998.
    • (1998) Advances in Neural Information Processing Systems , vol.10 , pp. 943-949
    • Ryan, J.1    Lin, M.J.2    Miikkulainen, R.3
  • 15
    • 2442537609 scopus 로고    scopus 로고
    • NSOM: A real-time network-based intrusion detection system using self-organizing maps
    • Dept. of Applied Science, University of California, Davis
    • K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002.
    • (2002) Technical Report
    • Labib, K.1    Vemuri, R.2
  • 16
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson, "The Base-Rate Fallacy and the Difficulty of Intrusion Detection", ACM Trans. on Information and System Security, vol. 3, no.3, pp. 186-205, 2000.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 18
    • 0029230267 scopus 로고
    • A method of combining multiple experts for the recognition of unconstrained handwritten numerals
    • Y. S. Huang, C. Y. Suen, "A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 17, no. 1, pp. 90-94, 1995.
    • (1995) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.17 , Issue.1 , pp. 90-94
    • Huang, Y.S.1    Suen, C.Y.2
  • 19
    • 0142095450 scopus 로고    scopus 로고
    • Neural network classification reliability: Problems and applications
    • Image Processing and Pattern Recognition, Academic Press, San Diego, CA
    • L.P. Cordella, C. Sansone, F. Tortorella, M. Vento, C. De Stefano, "Neural Network Classification Reliability: Problems and Applications", in Image Processing and Pattern Recognition, vol. 5 of Neural Network Systems Techniques and Applications, Academic Press, San Diego, CA, pp. 161-200, 1998.
    • (1998) Neural Network Systems Techniques and Applications , vol.5 , pp. 161-200
    • Cordella, L.P.1    Sansone, C.2    Tortorella, F.3    Vento, M.4    De Stefano, C.5
  • 20
    • 1842712339 scopus 로고    scopus 로고
    • A genetic clustering method for intrusion detection
    • Y. Liu, K. Chen, X. Liao, W. Zhang, "A genetic clustering method for intrusion detection", Pattern Recognition vol. 37, 2004.
    • (2004) Pattern Recognition , vol.37
    • Liu, Y.1    Chen, K.2    Liao, X.3    Zhang, W.4
  • 21
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 22
    • 0035416013 scopus 로고    scopus 로고
    • Difficulties in simulating the internet
    • V. Paxson, S. Floyd, "Difficulties in simulating the internet", IEEE/ACM Transactions on Networking, vol. 9, no. 4, pp. 392-403, 2001.
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.4 , pp. 392-403
    • Paxson, V.1    Floyd, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.