메뉴 건너뛰기




Volumn E89-D, Issue 1, 2006, Pages 201-230

An anomaly intrusion detection system based on vector quantization

Author keywords

Anomaly intrusion detection; Codebook; Quantization error; Usage profile; Vector quantization

Indexed keywords

ALGORITHMS; CONGESTION CONTROL (COMMUNICATION); DATA MINING; LEARNING SYSTEMS; SECURITY SYSTEMS; TELECOMMUNICATION TRAFFIC;

EID: 32244436344     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1093/ietisy/e89-d.1.201     Document Type: Conference Paper
Times cited : (38)

References (35)
  • 1
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • Sept.
    • T. Verwoerd and R. Hunt, "Intrusion detection techniques and approaches," Comput. Commun., vol.25, no.15, pp.1356-1365, Sept. 2002.
    • (2002) Comput. Commun. , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 2
    • 4344659702 scopus 로고    scopus 로고
    • Anomaly detection methods in wired networks: A survey and taxonomy
    • Oct.
    • J.M. Estvez-Tapiador, P. Garcia-Teodoro, and J.E. Diaz-Verdejo, "Anomaly detection methods in wired networks: A survey and taxonomy," Comput. Commun., vol.27, no. 16, pp. 1569-1584, Oct. 2004.
    • (2004) Comput. Commun. , vol.27 , Issue.16 , pp. 1569-1584
    • Estvez-Tapiador, J.M.1    Garcia-Teodoro, P.2    Diaz-Verdejo, J.E.3
  • 4
    • 85027158471 scopus 로고    scopus 로고
    • http://www.snort.org,2004
    • (2004)
  • 5
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D.E. Denning. "An intrusion-detection model," IEEE Trans. Softw. Eng., vol.13, no.2, pp.222-232, Feb. 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 6
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • Jan.
    • N. Ye, "Multivariate statistical analysis of audit trails for host-based intrusion detection," IEEE Trans. Comput., vol.51, no.13, pp.810-820, Jan. 2002.
    • (2002) IEEE Trans. Comput. , vol.51 , Issue.13 , pp. 810-820
    • Ye, N.1
  • 7
    • 0036122767 scopus 로고    scopus 로고
    • Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
    • Jan.
    • S.M. Emran and N. Ye, "Robustness of chi-square and Canberra techniques in detecting intrusions into information systems," Qual. Reliab. Eng. Int., vol.18, no.1, pp.19-28, Jan. 2002.
    • (2002) Qual. Reliab. Eng. Int. , vol.18 , Issue.1 , pp. 19-28
    • Emran, S.M.1    Ye, N.2
  • 8
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled-data
    • Kluwer
    • E. Eskin, A. Arnold, and M. Prerau, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled-data," in Applications of Data Mining in Computer Security, Kluwer, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3
  • 9
    • 4344644051 scopus 로고    scopus 로고
    • A clustering-based anomaly intrusion detection for a host computer
    • Aug.
    • S.H. Oh and W.S. Lee, "A clustering-based anomaly intrusion detection for a host computer," IEICE Trans. Inf. & Syst., vol.E87-D, no.8, pp.2086-2094, Aug. 2004.
    • (2004) IEICE Trans. Inf. & Syst. , vol.E87-D , Issue.8 , pp. 2086-2094
    • Oh, S.H.1    Lee, W.S.2
  • 11
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • San Francisco, CA, July
    • E. Eskin, "Anomaly detection over noisy data using learned probability distributions," Proc. 17th Int. Conf. Machine Learning, pp.255-262, San Francisco, CA, July 2000.
    • (2000) Proc. 17th Int. Conf. Machine Learning , pp. 255-262
    • Eskin, E.1
  • 12
    • 0002948319 scopus 로고    scopus 로고
    • Algorithms for mining distance-based outliers in large datasets
    • New York, USA, Sept.
    • E. Knorr and R. Ng, "Algorithms for mining distance-based outliers in large datasets," Proc. VLDB Conference, pp.392-403, New York, USA, Sept. 1998.
    • (1998) Proc. VLDB Conference , pp. 392-403
    • Knorr, E.1    Ng, R.2
  • 13
    • 32344452166 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection
    • Orlando, FL, May
    • A. Lazarevic, L. Ertoz, A. Ozgur, and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," Proc. SIAM Conf. Data Mining, pp.108-120, Orlando, FL, May 2003.
    • (2003) Proc. SIAM Conf. Data Mining , pp. 108-120
    • Lazarevic, A.1    Ertoz, L.2    Ozgur, A.3    Srivastava, J.4
  • 15
    • 84943383590 scopus 로고    scopus 로고
    • Identifying important features for intrusion detection using support vector machines and neural networks
    • Orlando, USA, Jan.
    • A.H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," Proc. 2003 Symposium on Applications and the Internet, pp.209-217, Orlando, USA, Jan. 2003.
    • (2003) Proc. 2003 Symposium on Applications and the Internet , pp. 209-217
    • Sung, A.H.1    Mukkamala, S.2
  • 16
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly intrusion detection method based on HMM
    • June
    • Y. Qiao, X.W. Xin, Y. Bin, and S. Ge, "Anomaly intrusion detection method based on HMM," Electron. Lett., vol.38, no. 13, pp.663-664, June 2002.
    • (2002) Electron. Lett. , vol.38 , Issue.13 , pp. 663-664
    • Qiao, Y.1    Xin, X.W.2    Bin, Y.3    Ge, S.4
  • 17
    • 32244444272 scopus 로고    scopus 로고
    • An adaptive intrusion detection system using neural network
    • UNESP, Brazil
    • J.M. Bonifaco and E.S. Moreira, "An adaptive intrusion detection system using neural network," Research Report, UNESP, Brazil, 1997.
    • (1997) Research Report
    • Bonifaco, J.M.1    Moreira, E.S.2
  • 21
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • Oct.
    • Y. Liao and V. Rao Vemuri, "Use of k-nearest neighbor classifier for intrusion detection," Comput. Secur., vol.21, no.5, pp.439-448, Oct. 2002.
    • (2002) Comput. Secur. , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Rao Vemuri, V.2
  • 25
    • 0018918171 scopus 로고
    • An algorithm for vector quantizer design
    • Jan.
    • Y. Linde, A. Buzo, and R.M. Gray, "An algorithm for vector quantizer design," IEEE Trans. Commun., vol.28, no.1, pp.84-95, Jan. 1980.
    • (1980) IEEE Trans. Commun. , vol.28 , Issue.1 , pp. 84-95
    • Linde, Y.1    Buzo, A.2    Gray, R.M.3
  • 26
    • 0037522007 scopus 로고    scopus 로고
    • Indexing multimedia data in high-dimensional and weighted feature spaces
    • Brisbane, Australia, May
    • K. Goh and E. Chang, "Indexing multimedia data in high-dimensional and weighted feature spaces," Proc. 6th Visual Database Conference, pp. 127-140, Brisbane, Australia, May 2002.
    • (2002) Proc. 6th Visual Database Conference , pp. 127-140
    • Goh, K.1    Chang, E.2
  • 28
    • 0024984441 scopus 로고
    • Adaptive, real-time anomaly detection using inductively generated sequential patterns
    • Oakland, USA, May
    • H. Teng, K. Chen, and S. Lu, "Adaptive, real-time anomaly detection using inductively generated sequential patterns," Proc. IEEE Symposium on Research in Security and Privacy, pp.278-284, Oakland, USA, May 1990.
    • (1990) Proc. IEEE Symposium on Research in Security and Privacy , pp. 278-284
    • Teng, H.1    Chen, K.2    Lu, S.3
  • 29
    • 0028607656 scopus 로고
    • A new competitive learning approach based on an equidistoition principle for designing optimal vector quantizers
    • Sept.
    • N. Ueda and R. Nakano, "A new competitive learning approach based on an equidistoition principle for designing optimal vector quantizers," IEEE Trans. Neural Netw., vol.7, no.8, pp. 1211-1227, Sept. 1994.
    • (1994) IEEE Trans. Neural Netw. , vol.7 , Issue.8 , pp. 1211-1227
    • Ueda, N.1    Nakano, R.2
  • 31
    • 32244444468 scopus 로고    scopus 로고
    • A fast codebook search algorithm for vector quantization
    • Feb.
    • Z. Lu, J. Pan, and S. Sun, "A fast codebook search algorithm for vector quantization," Acta Electronica Sinica, vol.28, no.2, pp. 133-135, Feb. 2000.
    • (2000) Acta Electronica Sinica , vol.28 , Issue.2 , pp. 133-135
    • Lu, Z.1    Pan, J.2    Sun, S.3
  • 32
    • 85027099846 scopus 로고    scopus 로고
    • http://libnids.sourceforge.net/
  • 33
    • 85027128451 scopus 로고    scopus 로고
    • http://www.ll.mit.edu/IST/ideval/index.html
  • 34
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-Line intrusion detection evaluation
    • Oct.
    • R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das, "The 1999 DARPA off-Line intrusion detection evaluation," Comput. Netw., vol.34, no.4, pp.579-595, Oct. 2000.
    • (2000) Comput. Netw. , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 35
    • 10844230994 scopus 로고    scopus 로고
    • Intrusion detection using an ensemble of intelligent paradigms
    • Feb.
    • S. Mukkamala, A.H. Sung, and A. Abraham, "Intrusion detection using an ensemble of intelligent paradigms," J. Netw. Comput. Appl., vol.28, no.2, pp.167-182, Feb. 2005.
    • (2005) J. Netw. Comput. Appl. , vol.28 , Issue.2 , pp. 167-182
    • Mukkamala, S.1    Sung, A.H.2    Abraham, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.