메뉴 건너뛰기




Volumn 4219 LNCS, Issue , 2006, Pages 1-18

A framework for the application of association rule mining in large intrusion detection infrastructures

Author keywords

Association rules; Data mining; Graph algorithms; Intrusion detection

Indexed keywords

ALGORITHMS; COMPUTER CRIME; DATA MINING; GRAPH THEORY; PROBLEM SOLVING;

EID: 33750327345     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11856214_1     Document Type: Conference Paper
Times cited : (64)

References (37)
  • 4
    • 84941151485 scopus 로고    scopus 로고
    • Arcsight Corporation.: Arcsight ESM Product Brief, http://www.arcsight. com/collateral/ArcSight_ESM_brochure.pdf (2005)
    • (2005) Arcsight ESM Product Brief
  • 6
    • 0142253852 scopus 로고    scopus 로고
    • ADAM: A testbed for exploring the use of data mining in intrusion detection
    • Barbara, D., Couto, J., Jajodia, S., Wu, N.: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record Volume 30 Number 4 (2001) 15-24
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 15-24
    • Barbara, D.1    Couto, J.2    Jajodia, S.3    Wu, N.4
  • 7
    • 84941146861 scopus 로고    scopus 로고
    • Cisco Systems. Network Security Database, http://www.cisco.com/cgi-bin/ front.x/csec/idsAllList.pl (2005)
    • Network Security Database
  • 13
    • 1642375563 scopus 로고    scopus 로고
    • Adaptive model generation: An architecture for the deployment of data mining-based intrusion detection systems
    • Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
    • Honig, A., Howard, A., Eskin, E., Stolfo, S.: Adaptive Model Generation : An Architecture for the Deployment of Data Mining-based Intrusion Detection Systems. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 153-194
    • (2002) Applications of Data Mining in Computer Security , pp. 153-194
    • Honig, A.1    Howard, A.2    Eskin, E.3    Stolfo, S.4
  • 18
    • 27544512530 scopus 로고    scopus 로고
    • Data mining for intrusion detection a critical review
    • Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
    • Julisch, K.: Data Mining for Intrusion Detection A Critical Review. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 33-62
    • (2002) Applications of Data Mining in Computer Security , pp. 33-62
    • Julisch, K.1
  • 20
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch, K. Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security, Volume 6, Number 4 (2003) 443-471
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 26
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks, Volume 34 (2000) 579-595
    • (2000) Computer Networks , vol.34 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 28
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • Mchugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security, Volume 3, Number 4 (2000) 262-294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • Mchugh, J.1
  • 32
    • 0038282217 scopus 로고    scopus 로고
    • Modern intrusion detection, data mining, and degrees of attack guilt
    • Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
    • Noel, S., Wijesekera, D., Youman, C.: Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 1-31
    • (2002) Applications of Data Mining in Computer Security , pp. 1-31
    • Noel, S.1    Wijesekera, D.2    Youman, C.3
  • 35
    • 85012240666 scopus 로고    scopus 로고
    • Data mining-based intrusion detectors: An overview of the columbia IDS project
    • Stolfo, S., Lee, W., Chan, P., Fan, W., Eskin, E.: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record, Vol. 30, No. 4 (2001) 5-14
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 5-14
    • Stolfo, S.1    Lee, W.2    Chan, P.3    Fan, W.4    Eskin, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.