메뉴 건너뛰기




Volumn 4223 LNAI, Issue , 2006, Pages 1082-1091

Clustering and classification based anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; ERROR DETECTION; FUNCTION EVALUATION; NETWORK PROTOCOLS; PACKET NETWORKS; SECURITY OF DATA;

EID: 33750541660     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11881599_134     Document Type: Conference Paper
Times cited : (18)

References (13)
  • 1
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • International Symposium on Recent Advances in Intrusion Detection (RAID 2004), Springer-Verlag, Berlin Heidelberg
    • Ke Wang and Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. International Symposium on Recent Advances in Intrusion Detection (RAID 2004), LNCS 3224, Springer-Verlag, Berlin Heidelberg (2004) 203-222
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 3
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • Stanifor, Hoagland and McAlerney: Practical Automated Detection of Stealthy PortScans. Journal of Computer Security Vol. 10(1/2) (2002) 105-136
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 105-136
    • Stanifor, H.1    McAlerney2
  • 4
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet header anomaly detection for identifying hostile network traffic
    • Technical report, April
    • M. V. Mahoney, P.K. Chan: PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic. Technical report, Florida Tech., technical report CS-2001-4, April (2001)
    • (2001) Florida Tech., Technical Report , vol.CS-2001-4
    • Mahoney, M.V.1    Chan, P.K.2
  • 5
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • M. Mahoney: Network Traffic Anomaly Detection Based on Packet Bytes. Proc. ACM. Symposium on Applied Computing (2003) 346-350
    • (2003) Proc. ACM. Symposium on Applied Computing , pp. 346-350
    • Mahoney, M.1
  • 6
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • November
    • Wenke Lee, Stolfo SJ: A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security, Vol. 3(4) November (2000) 227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 7
    • 0142253852 scopus 로고    scopus 로고
    • ADAM: A testbed for exploring the use of data mining in intrusion detection
    • D. Barbara, Julia Couto, Sushil Jajodia, Ningning Wu: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record (2001) 15-24
    • (2001) SIGMOD Record , pp. 15-24
    • Barbara, D.1    Couto, J.2    Jajodia, S.3    Wu, N.4
  • 9
    • 0347606556 scopus 로고    scopus 로고
    • Winning the KDD99 classification Cup: Bagged boosting
    • B.Pfahringer : Winning the KDD99 Classification Cup: Bagged Boosting, SIGKDD explorations, Vol. 1(2) (2000) 65-66
    • (2000) SIGKDD Explorations , vol.1 , Issue.2 , pp. 65-66
    • Pfahringer, B.1
  • 11
    • 0001457509 scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • MacQueen: Some methods for classification and analysis of multivariate observations. In Proc. 5th Berkeley Symp. Math. Statistics and Probability (1967) 281-297
    • (1967) Proc. 5th Berkeley Symp. Math. Statistics and Probability , pp. 281-297
    • MacQueen1
  • 13
    • 84941156097 scopus 로고    scopus 로고
    • University of California, Irvine: KDD Cup 1999 Data, http://www.ics.uci. edu/kdd/databases/kddcup99/kddcup99.html (2005)
    • (2005) KDD Cup 1999 Data


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.