메뉴 건너뛰기




Volumn , Issue , 2005, Pages 120-127

Real time detection of novel attacks by means of data mining techniques

Author keywords

Intrusion detection; Traffic features

Indexed keywords

DATA MINING TECHNIQUES; DETECTION TECHNIQUE; INTRUSION DETECTION SYSTEMS; NETWORK TRAFFIC; OFF-LINE ANALYSIS; REAL-TIME DETECTION; RULE BASED; SECURITY ADMINISTRATOR; SET OF RULES; TRAFFIC FEATURES;

EID: 27244454402     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (21)

References (14)
  • 2
    • 0037986866 scopus 로고
    • Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides)
    • Andersson, D. (1995). Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides). Technical report, Computer Science Laboratory.
    • (1995) Technical Report, Computer Science Laboratory
    • Andersson, D.1
  • 3
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing
    • Bace, R. G. (2000). Intrusion Detection. Macmillan Technical Publishing.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 7
    • 0038428854 scopus 로고    scopus 로고
    • Results of the kdd99 classifier learning
    • ACM
    • Elkan, C. (2000). Results of the kdd99 classifier learning. In SIGKDD Explorations, volume 1, pages 63-64. ACM.
    • (2000) SIGKDD Explorations , vol.1 , pp. 63-64
    • Elkan, C.1
  • 8
    • 0002283033 scopus 로고    scopus 로고
    • From data mining to knowledge discovery in databases
    • Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P. (1996). From data mining to knowledge discovery in databases. AI Magazine, pages 37-52.
    • (1996) AI Magazine , pp. 37-52
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 9
    • 1642263885 scopus 로고    scopus 로고
    • How to guide - Implementing a network based intrusion detection system
    • Sovereign House, 57/59 Vaster Road, Reading
    • Laing, B. and Alderson, J. (2000). How to guide - implementing a network based intrusion detection system. Technical report, Internet Security Systems, Sovereign House, 57/59 Vaster Road, Reading.
    • (2000) Technical Report, Internet Security Systems
    • Laing, B.1    Alderson, J.2
  • 10
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee, W. and Stolfo, S. J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 12
    • 0022093855 scopus 로고
    • Self adjusting binary search trees
    • Sleator, D. and Tarjan, R. (1985). Self Adjusting Binary Search Trees. Journal of the ACM, 32(3).
    • (1985) Journal of the ACM , vol.32 , Issue.3
    • Sleator, D.1    Tarjan, R.2
  • 14
    • 0002067431 scopus 로고    scopus 로고
    • Netstat: A network based intrusion detection system
    • Vigna, G. and Kemmerer, R. (1999). Netstat: a network based intrusion detection system. Journal of Computer Security, 7(1).
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.