메뉴 건너뛰기




Volumn 8, Issue 3, 2006, Pages 163-177

An attack-norm separation approach for detecting cyber attacks

Author keywords

Computer and network security; Cyber attacks; Intrusion detection; Signal detection; Signal processing

Indexed keywords

ATTACK-NORM SEPARATION APPROACH; COMPUTER AND NETWORK SECURITY; CYBER ATTACKS; INTRUSION DETECTION;

EID: 33745925265     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-006-8731-y     Document Type: Article
Times cited : (8)

References (31)
  • 1
    • 85032752222 scopus 로고    scopus 로고
    • Recent developments in the core of digital signal processing
    • Atlas L, Duhamel P. Recent developments in the core of digital signal processing. IEEE Signal Processing Magazine 1999; 16(1):16-31.
    • (1999) IEEE Signal Processing Magazine , vol.16 , Issue.1 , pp. 16-31
    • Atlas, L.1    Duhamel, P.2
  • 12
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • August
    • Lane T, Brodley C. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security August 1999;2(3):295-331.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.2
  • 15
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive intrusion detection: A data mining approach
    • Kluwer Academic Publishers, December
    • Lee W, Stolfo S, Mok K. Adaptive intrusion detection: A data mining approach, In: Artificial Intelligence Review. Kluwer Academic Publishers, December 2000;14(6):533-567.
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 17
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W, Stolfo S. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 2000;3(4).
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4
    • Lee, W.1    Stolfo, S.2
  • 18
    • 0003111439 scopus 로고
    • Automated audit trail analysis and intrusion detection: A survey
    • Baltimore, MD
    • Lunt T. Automated audit trail analysis and intrusion detection: A survey. In: 14th National Computer Security Conference (NCSC), Baltimore, MD, 1988.
    • (1988) 14th National Computer Security Conference (NCSC)
    • Lunt, T.1
  • 20
    • 0345302842 scopus 로고    scopus 로고
    • Upper Saddle River, New Jersey, Prentice Hall PTR
    • Skoudis E. Counter Hack. Upper Saddle River, New Jersey, Prentice Hall PTR, 2002.
    • (2002) Counter Hack
    • Skoudis, E.1
  • 23
    • 0036298895 scopus 로고    scopus 로고
    • QoS-centric stateful resource management in information systems
    • Ye N. QoS-centric stateful resource management in information systems. Information Systems Frontiers 2002;4(2): 149-160.
    • (2002) Information Systems Frontiers , vol.4 , Issue.2 , pp. 149-160
    • Ye, N.1
  • 24
    • 10044229782 scopus 로고    scopus 로고
    • Ye N. (ed.). Mahwah, New Jersey: Lawrence Erlbaum Associates
    • Ye N. (ed.). The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003.
    • (2003) The Handbook of Data Mining
  • 25
    • 24944461970 scopus 로고    scopus 로고
    • Mining computer and network security data
    • Ye N. eds. Mahwah, New Jersey: Lawrence Erlbaum Associates
    • Ye N. Mining computer and network security data. In: Ye N. eds., The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003;617-636.
    • (2003) The Handbook of Data Mining , pp. 617-636
    • Ye, N.1
  • 26
    • 33745918703 scopus 로고    scopus 로고
    • Attack profiles to derive data observations, features, and characteristics of cyber attacks
    • Ye N, Bashettihalli H, Parley T. "Attack profiles to derive data observations, features, and characteristics of cyber attacks." Information, Knowledge, Systems Management 2005-2006;5(1):23-47.
    • (2005) Information, Knowledge, Systems Management , vol.5 , Issue.1 , pp. 23-47
    • Ye, N.1    Bashettihalli, H.2    Parley, T.3
  • 27
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Ye N. Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;52(1):73-82.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 73-82
    • Ye, N.1    Chen, Q.2
  • 28
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Ye N, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003:52(1):73-82.
    • (2003) IEEE Transactions on Reliability , vol.52 , Issue.1 , pp. 73-82
    • Ye, N.1    Chen, Q.2
  • 29
    • 84888854404 scopus 로고    scopus 로고
    • Extraction and detection of signal features and characteristics in the physical space: Towards signal detection in the Cyberspace
    • in review
    • Ye N, Jearkpaporn D, Lakshminarasimhan DK. Extraction and detection of signal features and characteristics in the physical space: Towards signal detection in the Cyberspace. Proceedings of the IEEE, (in review).
    • Proceedings of the IEEE
    • Ye, N.1    Jearkpaporn, D.2    Lakshminarasimhan, D.K.3
  • 31
    • 84888848066 scopus 로고    scopus 로고
    • Correlations of activity, state and performance data on computers and networks in attack and normal conditions
    • in review
    • Ye N. Napatkamon A, Farley T. Correlations of activity, state and performance data on computers and networks in attack and normal conditions. IEEE Transactions on Dependable and Secure Computing (in review).
    • IEEE Transactions on Dependable and Secure Computing
    • Ye, N.1    Napatkamon, A.2    Farley, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.