메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 63-77

A framework for the evaluation of intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

EVALUATION METRICS; INTRUSION DETECTION OPERATING CHARACTERISTIC (IDOC); INTRUSION DETECTION SYSTEMS;

EID: 33751035185     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2006.2     Document Type: Conference Paper
Times cited : (76)

References (36)
  • 1
    • 84860029979 scopus 로고    scopus 로고
    • DARPA intrusion detection evaluation
    • The MIT lincoln labs evaluation data set, DARPA intrusion detection evaluation. Available at http://www.ll.mit.edu/IST/idevayindex.html.
    • The MIT Lincoln Labs Evaluation Data Set
  • 7
    • 4143149628 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • D. Barbara and S. Jajodia, editors. Kluwer
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In D. Barbara and S. Jajodia, editors, Data Mining for Security Applications. Kluwer, 2002.
    • (2002) Data Mining for Security Applications
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 11
    • 85084160972 scopus 로고    scopus 로고
    • Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
    • H. Handley, C. Kreibich, and V. Paxson. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, 2001.
    • (2001) 10th USENIX Security Symposium
    • Handley, H.1    Kreibich, C.2    Paxson, V.3
  • 22
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by the Lincoln laboratory
    • November
    • J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by the Lincoln laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262-294, November 2000.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 24
    • 0035283313 scopus 로고    scopus 로고
    • Robust classification for imprecise environments
    • March
    • F. Provost and T. Fawcett. Robust classification for imprecise environments. Machine Learning, 42(3):203-231, March 2001.
    • (2001) Machine Learning , vol.42 , Issue.3 , pp. 203-231
    • Provost, F.1    Fawcett, T.2
  • 30
    • 35248821244 scopus 로고    scopus 로고
    • Hiding intrusions: From the abnormal to the normal and beyond
    • Noordwijkerhout, The Netherlands, October
    • K. Tan, J. McHugh, and K. Killourhy. Hiding intrusions: From the abnormal to the normal and beyond. In Information Hiding: 5th International Workshop, pages 1-17, Noordwijkerhout, The Netherlands, October 2002.
    • (2002) Information Hiding: 5th International Workshop , pp. 1-17
    • Tan, K.1    McHugh, J.2    Killourhy, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.