메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 119-134

An application of information theory to intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER CRIME; DATA COMPRESSION; INTERNET; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33750956035     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWIA.2006.3     Document Type: Conference Paper
Times cited : (29)

References (39)
  • 1
    • 0004169830 scopus 로고    scopus 로고
    • Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Chinchester, West Sussex, England, third edition
    • V. Barnett and T. Lewis. Outliers in Statistical Data. Wiley Series in Probability and Mathematical Statistics. John Wiley & Sons, Chinchester, West Sussex, England, third edition, 2000.
    • (2000) Outliers in Statistical Data
    • Barnett, V.1    Lewis, T.2
  • 3
    • 33750943135 scopus 로고    scopus 로고
    • October 27. Eindhoven, Netherlands
    • W. Bergmans. Maximum compression. http://www.maximumcompression.com, October 27, 2005. Eindhoven, Netherlands.
    • (2005)
    • Bergmans, W.1
  • 4
    • 33750931718 scopus 로고    scopus 로고
    • November 26
    • P. Bogaerts. Hping tutorial. http://www.radarhack.com/dir/papers/ hping2_v1.5.pdfl, November 26, 2005.
    • (2005) Hping Tutorial
    • Bogaerts, P.1
  • 6
    • 0003594381 scopus 로고    scopus 로고
    • Duxbury Press, Pacific Grove, Cal., second edition
    • G. Casela and R. L. Berger. Statistical Inference. Duxbury Press, Pacific Grove, Cal., second edition, 2001.
    • (2001) Statistical Inference
    • Casela, G.1    Berger, R.L.2
  • 7
    • 45749157480 scopus 로고    scopus 로고
    • The economic impact of cyber-attacks
    • Congressional Research Service The Library of Congress, April
    • B. Cashell, W. D. Jackson, M. Jickling, and B. Webel. The economic impact of cyber-attacks. CRS Report for Congress RL32331, Congressional Research Service The Library of Congress, April 2004.
    • (2004) CRS Report for Congress RL32331
    • Cashell, B.1    Jackson, W.D.2    Jickling, M.3    Webel, B.4
  • 8
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • June
    • S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24:295-307, June 2005.
    • (2005) Computers & Security , vol.24 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 9
    • 84889281816 scopus 로고
    • Wiley Series in Telecommunications. John Wiley and Sons, Inc., New York
    • T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley Series in Telecommunications. John Wiley and Sons, Inc., New York, 1991.
    • (1991) Elements of Information Theory
    • Cover, T.M.1    Thomas, J.A.2
  • 10
    • 33750935964 scopus 로고    scopus 로고
    • February 2. the Center for Education and Research in Information Assurance (CERIAS), Purdue University, West Lafayette, Indiana
    • D. Curry. Intrusion detection systems. http://www.cerias.purdue.edu/ about/history/coast_resources/idcontent/ids.html, February 2, 2006. the Center for Education and Research in Information Assurance (CERIAS), Purdue University, West Lafayette, Indiana.
    • (2006) Intrusion Detection Systems
    • Curry, D.1
  • 13
    • 33750953729 scopus 로고    scopus 로고
    • Network security though conservation of complexity
    • The Disneyland Resort, Anaheim, California, October
    • S. C. Evans and B. Barnett. Network security though conservation of complexity. In Proceedings of MILCOM, The Disneyland Resort, Anaheim, California, October 2003.
    • (2003) Proceedings of MILCOM
    • Evans, S.C.1    Barnett, B.2
  • 15
    • 33750819021 scopus 로고    scopus 로고
    • A two-stage complexity estimator
    • General Electric Research and Development Center, August 200
    • S. C. Evans and J. Hershey. A two-stage complexity estimator. Technical Information Series 2002GRC197, General Electric Research and Development Center, August 200.
    • Technical Information Series 2002GRC197
    • Evans, S.C.1    Hershey, J.2
  • 16
    • 33750934507 scopus 로고    scopus 로고
    • fyodor, November 26
    • fyodor. Port scanning techniques. http://www.insecure.org/nmap/man/man- port-scanning-techniques.html, November 26, 2005.
    • (2005) Port Scanning Techniques
  • 17
    • 33750837824 scopus 로고    scopus 로고
    • August 30. the Carleton University, 1125 Colonel By Drive, Ottowa, Ontario, K1S5B6, Canada
    • J. Gilchrist. Archive compression test. http://www.compression.ca/act, August 30, 2005. the Carleton University, 1125 Colonel By Drive, Ottowa, Ontario, K1S5B6, Canada.
    • (2005) Archive Compression Test
    • Gilchrist, J.1
  • 18
    • 2142714170 scopus 로고    scopus 로고
    • Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches
    • S. Goel and S. F. Bush. Kolmogorov complexity estimates for detection of viruses in biologically inspired security systems: A comparison with traditional approaches. Complexity, 9(2):54-73, 2003.
    • (2003) Complexity , vol.9 , Issue.2 , pp. 54-73
    • Goel, S.1    Bush, S.F.2
  • 21
    • 0031123773 scopus 로고    scopus 로고
    • A quantitative model of the security intrusion process based on attacker bahavior
    • E. Jonsson and T. Olovsson. A quantitative model of the security intrusion process based on attacker bahavior. IEEE Transactions on Software Engineering, 23:235-245, 1997.
    • (1997) IEEE Transactions on Software Engineering , vol.23 , pp. 235-245
    • Jonsson, E.1    Olovsson, T.2
  • 22
    • 33750843323 scopus 로고    scopus 로고
    • JWS, August 30
    • JWS. Tcpdump public repository. http://www.tcpdump.org/, August 30, 2005.
    • (2005) Tcpdump Public Repository
  • 24
    • 0001902056 scopus 로고
    • Three approaches to the quantitative definition of information
    • A. N. Kolmogorov. Three approaches to the quantitative definition of information. Problems of Information Transmission, 1:4-7, 1965.
    • (1965) Problems of Information Transmission , vol.1 , pp. 4-7
    • Kolmogorov, A.N.1
  • 25
    • 84937652953 scopus 로고
    • Logical basis for information theory and probability theory
    • A. N. Kolmogorov. Logical basis for information theory and probability theory. IEEE Transactions on Information Theory, IT-14:662-664, 1968.
    • (1968) IEEE Transactions on Information Theory , vol.IT-14 , pp. 662-664
    • Kolmogorov, A.N.1
  • 27
    • 0013347997 scopus 로고    scopus 로고
    • Detecting distributed denial of service attacks using kolmogorov complexity
    • General Electric Research and Development Center, December
    • A. Kulkarni, S. F. Bush, and S. C. Evans. Detecting distributed denial of service attacks using kolmogorov complexity. Technical Information Series 2001crd176, General Electric Research and Development Center, December 2001.
    • (2001) Technical Information Series 2001crd176
    • Kulkarni, A.1    Bush, S.F.2    Evans, S.C.3
  • 31
    • 38549151192 scopus 로고    scopus 로고
    • October 27. the Florida Institute of Technology, 150 W. University Blvd. Melbourne, FL 32901, USA
    • M. Mahoney. The paq data compression programs. http://www.cs.fit.edu/ mmahoney/compression/, October 27, 2005. the Florida Institute of Technology, 150 W. University Blvd. Melbourne, FL 32901, USA.
    • (2005) The Paq Data Compression Programs
    • Mahoney, M.1
  • 34
    • 33750959529 scopus 로고    scopus 로고
    • October 27. the Visicron Corp., 3 Bethesda Metro Center, Suite #700, Bethesda, Maryland, 20814, USA
    • M. Nelson. Benchmarks. http://www.data-compression.info/Benchmarks.shtml, October 27, 2005. the Visicron Corp., 3 Bethesda Metro Center, Suite #700, Bethesda, Maryland, 20814, USA.
    • (2005)
    • Nelson, M.1
  • 35
    • 1342280323 scopus 로고    scopus 로고
    • Hewlett-Packard Professional Books. Prentice Hall PTR, Upper SaddleRiver, New Jersey
    • R. W. Potter. The Art of Measurement Theory and Practice. Hewlett-Packard Professional Books. Prentice Hall PTR, Upper SaddleRiver, New Jersey, 2000.
    • (2000) The Art of Measurement Theory and Practice
    • Potter, R.W.1
  • 36
    • 33750932288 scopus 로고    scopus 로고
    • October 27. the Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand
    • M. Powell. Canterbury corpus. http://www.corpus.canterbury.ac.nz, October 27, 2005. the Department of Computer Science and Software Engineering, University of Canterbury, Christchurch, New Zealand.
    • (2005)
    • Powell, M.1
  • 39
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Sophia Antipolis, French Riviera, France, September 15-17
    • K. Wang and S. J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'04, Sophia Antipolis, French Riviera, France, September 15-17 2004.
    • (2004) Proceedings of RAID'04
    • Wang, K.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.