메뉴 건너뛰기




Volumn 60, Issue 1, 2006, Pages 1-26

Probabilistic anomaly detection in distributed computer networks

Author keywords

Anomaly detection; Data mining; Machine learning

Indexed keywords

ALGORITHMS; DATA MINING; HUMAN COMPUTER INTERACTION; LEARNING SYSTEMS; MATHEMATICAL MODELS; PROBABILITY; RESOURCE ALLOCATION; STORAGE ALLOCATION (COMPUTER);

EID: 30344486259     PISSN: 01676423     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.scico.2005.06.001     Document Type: Article
Times cited : (39)

References (57)
  • 4
    • 15544363043 scopus 로고    scopus 로고
    • Principle components and importance ranking of distributed anomalies
    • K. Begnum, and M. Burgess Principle components and importance ranking of distributed anomalies Machine Learning Journal 58 2005 217 230
    • (2005) Machine Learning Journal , vol.58 , pp. 217-230
    • Begnum, K.1    Burgess, M.2
  • 7
    • 0029311990 scopus 로고
    • A site configuration engine
    • MIT Press Cambridge, MA
    • M. Burgess A site configuration engine Computing Systems vol. 8 1995 MIT Press Cambridge, MA 309
    • (1995) Computing Systems , vol.8 , pp. 309
    • Burgess, M.1
  • 9
    • 0032294044 scopus 로고    scopus 로고
    • Automated system administration with feedback regulation
    • M. Burgess Automated system administration with feedback regulation Software Practice and Experience 28 1998 1519
    • (1998) Software Practice and Experience , vol.28 , pp. 1519
    • Burgess, M.1
  • 10
  • 15
    • 30344459012 scopus 로고    scopus 로고
    • A graph theoretical model of computer security: From file access to social engineering
    • M. Burgess, G. Canright, and K. Engø A graph theoretical model of computer security: from file access to social engineering International Journal of Information Security 3 2004 70 85
    • (2004) International Journal of Information Security , vol.3 , pp. 70-85
    • Burgess, M.1    Canright, G.2    Engø, K.3
  • 17
    • 0003042004 scopus 로고    scopus 로고
    • Ponder: A language for specifying security and management policies for distributed systems
    • N. Damianou, N. Dulay, E.C. Lupu, M. Sloman, Ponder: a language for specifying security and management policies for distributed systems, Imperial College Research Report DoC 2000/1, 2000
    • (2000) Imperial College Research Report , vol.DOC 2000-1
    • Damianou, N.1    Dulay, N.2    Lupu, E.C.3    Sloman, M.4
  • 30
    • 85084164220 scopus 로고
    • Computer system performance problem detection using time series models
    • USENIX Association Berkeley, CA
    • P. Hoogenboom, and J. Lepreau Computer system performance problem detection using time series models Proceedings of the USENIX Technical Conference 1993 USENIX Association Berkeley, CA 15
    • (1993) Proceedings of the USENIX Technical Conference , pp. 15
    • Hoogenboom, P.1    Lepreau, J.2
  • 38
    • 0028201732 scopus 로고
    • Tolerance, danger and the extended family
    • P. Matzinger Tolerance, danger and the extended family Annual Review Immunology 12 1994 991
    • (1994) Annual Review Immunology , vol.12 , pp. 991
    • Matzinger, P.1
  • 41
    • 0032141693 scopus 로고    scopus 로고
    • A formal theory for optimal and information theoretic syntactic pattern recognition
    • B.J. Oommen, and R.L. Kashyap A formal theory for optimal and information theoretic syntactic pattern recognition Patter Recognition 31 1998 1159
    • (1998) Patter Recognition , vol.31 , pp. 1159
    • Oommen, B.J.1    Kashyap, R.L.2
  • 42
    • 85084164413 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real time
    • USENIX Association Berkeley, CA
    • V. Paxson Bro: A system for detecting network intruders in real time Proceedings of the 7th Security Symposium 1998 USENIX Association Berkeley, CA
    • (1998) Proceedings of the 7th Security Symposium
    • Paxson, V.1
  • 43
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modelling
    • V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modelling IEEE/ACM Transactions on Networking 3 3 1995 226
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226
    • Paxson, V.1    Floyd, S.2
  • 49
    • 0003232762 scopus 로고    scopus 로고
    • Levy processes and infinitely divisible distributions
    • Cambridge
    • K.I. Sato, Levy Processes and Infinitely Divisible Distributions, in: Cambridge Studies in Advanced Mathematics, Cambridge, 1999
    • (1999) Cambridge Studies in Advanced Mathematics
    • Sato, K.I.1
  • 57
    • 4444380999 scopus 로고    scopus 로고
    • A survey of fault localization techniques in computer networks
    • M. Steinder, and A. Sethi A survey of fault localization techniques in computer networks Science of Computer Programming 53 2003 165
    • (2003) Science of Computer Programming , vol.53 , pp. 165
    • Steinder, M.1    Sethi, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.