메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 144-156

POSEIDON: A 2-tier anomaly-based network intrusion detection system

Author keywords

[No Author keywords available]

Indexed keywords

BENCHMARKING; COMPUTER ARCHITECTURE; COMPUTER NETWORKS; COMPUTER SYSTEM FIREWALLS; DATA STRUCTURES;

EID: 33750937412     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2006.18     Document Type: Conference Paper
Times cited : (70)

References (35)
  • 2
    • 0142253852 scopus 로고    scopus 로고
    • ADAM: A testbed for exploring the use of data mining in intrusion detection
    • D. Barbará, J. Couto, S. Jajodia, and N. Wu. ADAM: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Record, 30(4):15-24, 2001.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 15-24
    • Barbará, D.1    Couto, J.2    Jajodia, S.3    Wu, N.4
  • 8
    • 6344255762 scopus 로고    scopus 로고
    • Next generation intrusion detection: Autonomous reinforcement learning of network attacks
    • J. D. Cannady. Next Generation Intrusion Detection: Autonomous Reinforcement Learning of Network Attacks. In NISSC '00: Proc. 23rd National Information Systems Security Conference, 2000. URL http://csrc.nist.gov/nissc/ 2000/proceedings/papers/033.pdf.
    • (2000) NISSC '00: Proc. 23rd National Information Systems Security Conference
    • Cannady, J.D.1
  • 10
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • M. Damashek. Gauging similarity with n-grams: Language-independent categorization of text. Science, 267(5199):843-848, 1995.
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 13
    • 1542292055 scopus 로고    scopus 로고
    • What is the nearest neighbor in high dimensional spaces?
    • A. E. Abbadi, M. L. Brodie, S. Chakravarthy, U. Dayal, N. Kamel, G. Schlageter, and K. Whang, editors. Morgan Kaufmann
    • A. Hinneburg, C. C. Aggarwal, and D. A. Keim. What Is the Nearest Neighbor in High Dimensional Spaces? In A. E. Abbadi, M. L. Brodie, S. Chakravarthy, U. Dayal, N. Kamel, G. Schlageter, and K. Whang, editors, VLDB '00: Proc. 26th International Conference on Very Large Data Bases, pages 506-515. Morgan Kaufmann, 2000.
    • (2000) VLDB '00: Proc. 26th International Conference on Very Large Data Bases , pp. 506-515
    • Hinneburg, A.1    Aggarwal, C.C.2    Keim, D.A.3
  • 15
    • 33750935229 scopus 로고    scopus 로고
    • SANS Institute - Internet Storm Center web site. URL http://isc.sans.org/ index.php?on=toptrends.
  • 17
    • 33745773307 scopus 로고    scopus 로고
    • Research Report RZ 3398, IBM Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, February
    • K. Julisch. Data Mining for Intrusion Detection: A Critical Review. Research Report RZ 3398, IBM Zurich Research Laboratory, 8803 Ruschlikon, Switzerland, February 2002.
    • (2002) Data Mining for Intrusion Detection: A Critical Review
    • Julisch, K.1
  • 18
    • 0004029914 scopus 로고
    • Self-Organizing Maps. Springer. (Second Extended Edition)
    • T. Kohonen. Self-Organizing Maps, volume 30 of Springer Series in Information Sciences. Springer. 1995. (Second Extended Edition 1997).
    • (1995) Springer Series in Information Sciences , vol.30
    • Kohonen, T.1
  • 21
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • USENIX Association
    • W. Lee and S. Stolfo. Data mining approaches for intrusion detection. In Proc. 7th USENIX Security Symposium, pages 79-94. USENIX Association, 1998.
    • (1998) Proc. 7th USENIX Security Symposium , pp. 79-94
    • Lee, W.1    Stolfo, S.2
  • 25
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
    • G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
    • M. V. Mahoney and P. K. Chan. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection, volume 2820 of LNCS, pages 220-237. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2820 , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 26
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • J. McHugh. Testing Intrusion Detection Systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294, 2000.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 262-294
    • Mchugh, J.1
  • 28
    • 35248842651 scopus 로고    scopus 로고
    • Detecting anomalous network traffic with self-organizing maps
    • G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
    • M. Ramadas, S. Ostermann, and B. C. Tjaden. Detecting Anomalous Network Traffic with Self-Organizing Maps. In G. Vigna, C. Kruegel, and E. Jonsson, editors, RAID '03: Proc. 6th Symposium on Recent Advances in Intrusion Detection, volume 2820 of LNCS, pages 36-54. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2820 , pp. 36-54
    • Ramadas, M.1    Ostermann, S.2    Tjaden, B.C.3
  • 30
    • 33750958987 scopus 로고    scopus 로고
    • Snort Network Intrusion Detection System web site. URL http://www.snort.org.
  • 31
    • 33745641552 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • A. Valdes and D. Zamboni, editors, RAID '05: Proc. 8th International Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
    • K. W. G. C. S. J. Stolfo. Anomalous Payload-based Worm Detection and Signature Generation. In A. Valdes and D. Zamboni, editors, RAID '05: Proc. 8th International Symposium on Recent Advances in Intrusion Detection, volume 3858 of LNCS, pages 227-246. Springer-Verlag, 2006.
    • (2006) LNCS , vol.3858 , pp. 227-246
    • Stolfo, K.W.G.C.S.J.1
  • 32
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • E. Jonsson, A. Valdes, and M. Almgren, editors, RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection. Springer-Verlag
    • K. Wang and S. J. Stolfo. Anomalous Payload-Based Network Intrusion Detection. In E. Jonsson, A. Valdes, and M. Almgren, editors, RAID '04: Proc. 7th Symposium on Recent Advances in Intrusion Detection, volume 3224 of LNCS, pages 203-222. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 34
    • 33745165284 scopus 로고    scopus 로고
    • Analyzing TCP traffic patterns using self organizing maps
    • F. Roli and S. Vitulano, editors, ICIAP '05: Proc. 13th International Conference on Image Analysis and Processing. Springer-Verlag
    • S. Zanero. Analyzing TCP Traffic Patterns using Self Organizing Maps. In F. Roli and S. Vitulano, editors, ICIAP '05: Proc. 13th International Conference on Image Analysis and Processing, volume 3617 of LNCS, pages 83-90. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3617 , pp. 83-90
    • Zanero, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.