메뉴 건너뛰기




Volumn 17, Issue 3, 2006, Pages 463-471

Network anomaly detector based on the D-S evidence theory

Author keywords

Anomaly detection; D S theory; Data fusion; Evidence theory; Intrusion detection

Indexed keywords

ADAPTIVE ALGORITHMS; DATA PROCESSING; DETECTORS; NETWORKS (CIRCUITS);

EID: 33646754276     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos170463     Document Type: Article
Times cited : (33)

References (19)
  • 4
    • 2542531740 scopus 로고    scopus 로고
    • A machine learning approach to detecting attacks by identifying anomalies in network traffic
    • Melbourne: Florida Institute of Technology
    • Mahoney VM. A machine learning approach to detecting attacks by identifying anomalies in network traffic[Ph.D. Thesis]. Melbourne: Florida Institute of Technology, 2003.
    • (2003)
    • Mahoney, V.M.1
  • 5
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Jonsson E., Valdes A. and Almgren M.(ed.), LNCS 3224, Heidelberg: Springer-Verlag
    • Wang K, Stolfo SJ. Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M, eds. Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004). LNCS 3224, Heidelberg: Springer-Verlag, 2004. 203-222.
    • (2004) Proc. of the 7th Int'l Symp. on Recent Advances in Intrusion Detection (RAID 2004) , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 6
    • 0036038437 scopus 로고    scopus 로고
    • Service specific anomaly detection for network intrusion detection
    • Lamont G.B., Haddad H., Papadopoulos G. and Panda B.(ed.), New York: ACM Press
    • Krugel C, Toth T, Kirda E. Service specific anomaly detection for network intrusion detection. In: Lamont GB, Haddad H, Papadopoulos G, Panda B, eds. Proc. of the 2002 ACM Symp. on Applied Computing. New York: ACM Press, 2002. 201-208.
    • (2002) Proc. of the 2002 ACM Symp. on Applied Computing , pp. 201-208
    • Krugel, C.1    Toth, T.2    Kirda, E.3
  • 7
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems. ACM Trans. on Information and System Security, 2000, 3(4): 227-261.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 8
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • Manikopoulos C, Papavassiliou S. Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine, 2002, 40(10): 76-82.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 9
    • 0038103863 scopus 로고    scopus 로고
    • An anomaly detection method based on fuzzy judgment
    • Chinese source
    • Zhang J, Gong J. An anomaly detection method based on fuzzy judgment. Journal of Computer Research and Development, 2003, 40(6): 776-783 (in Chinese with English abstract).
    • (2003) Journal of Computer Research and Development , vol.40 , Issue.6 , pp. 776-783
    • Zhang, J.1    Gong, J.2
  • 10
    • 33751017631 scopus 로고    scopus 로고
    • Immune system approaches to intrusion detection - A review
    • Nicosia G.(ed.), LNCS 3239, Heidelberg: Springer-Verlag
    • Aickelin U, Greensmith J, Twycross J. Immune system approaches to intrusion detection-A review. In: Nicosia G, et al., eds. Proc. of the 3rd Int'l Conf. on Artificial Immune Systems. LNCS 3239, Heidelberg: Springer-Verlag, 2004. 316-329.
    • (2004) Proc. of the 3rd Int'l Conf. on Artificial Immune Systems , pp. 316-329
    • Aickelin, U.1    Greensmith, J.2    Twycross, J.3
  • 11
    • 11244287524 scopus 로고    scopus 로고
    • An intrusion detection system based on support vector machine
    • Chinese source
    • Rao X, Dong CX, Yang SQ. An intrusion detection system based on support vector machine. Journal of Software, 2003, 14(4): 798-803 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/798.htm
    • (2003) Journal of Software , vol.14 , Issue.4 , pp. 798-803
    • Rao, X.1    Dong, C.X.2    Yang, S.Q.3
  • 12
    • 17944371143 scopus 로고    scopus 로고
    • Fuzzy multi-class support vector machine and application in intrusion detection
    • Chinese source
    • Li KL, Huang HK, Tian SF, Liu ZP, Liu ZQ. Fuzzy multi-class support vector machine and application in intrusion detection. Chinese Journal of Computers, 2005, 28(2): 274-280 (in Chinese with English abstract).
    • (2005) Chinese Journal of Computers , vol.28 , Issue.2 , pp. 274-280
    • Li, K.L.1    Huang, H.K.2    Tian, S.F.3    Liu, Z.P.4    Liu, Z.Q.5
  • 13
    • 21844463053 scopus 로고    scopus 로고
    • Network intrusion detection method based on multi-class support vector machine
    • Chinese source
    • Xiao Y, Han CH, Zheng QH, Wang Q. Network intrusion detection method based on multi-class support vector machine. Journal of Xi'an Jiaotong University, 2005, 39(6): 562-565 (in Chinese with English abstract).
    • (2005) Journal of Xi'an Jiaotong University , vol.39 , Issue.6 , pp. 562-565
    • Xiao, Y.1    Han, C.H.2    Zheng, Q.H.3    Wang, Q.4
  • 14
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln laboratory
    • McHugh J. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA offline intrusion detection system evaluation as performed by Lincoln laboratory. ACM Trans. on Information and System Security, 2000, 3(4): 262-294.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 15
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Baltimore
    • Porras PA, Neumann PG. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: Proc. of the 20th National Information Systems Security Conf. Baltimore. 1997. 353-365. http://www.csl.sri.com/papers/emerald-niss97/
    • (1997) Proc. of the 20th National Information Systems Security Conf , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 16
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by multivalued mapping
    • Dempster A. Upper and lower probabilities induced by multivalued mapping. Annals of Mathematical Statistics, 1967, 38(2): 325-339.
    • (1967) Annals of Mathematical Statistics , vol.38 , Issue.2 , pp. 325-339
    • Dempster, A.1
  • 17
    • 2442505788 scopus 로고    scopus 로고
    • Towards multisensor data fusion for DoS detection
    • Haddad H.M., Omicini A., Wainwright R.L. and Liebrock L.M.(ed.), New York: ACM Press
    • Siaterlis C, Maglaris B. Towards multisensor data fusion for DoS detection. In: Haddad HM, Omicini A, Wainwright RL, Liebrock LM, eds. Proc. of the 2004 ACM Symp. on Applied Computing. New York: ACM Press, 2004. 439-446.
    • (2004) Proc. of the 2004 ACM Symp. on Applied Computing , pp. 439-446
    • Siaterlis, C.1    Maglaris, B.2
  • 18
    • 0025460756 scopus 로고
    • Dempster's rule of combination is #P-complete
    • Orponen P. Dempster's rule of combination is #P-complete. Artificial Intelligence, 1990, 44(1-2): 245-253.
    • (1990) Artificial Intelligence , vol.44 , Issue.1-2 , pp. 245-253
    • Orponen, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.