메뉴 건너뛰기




Volumn 30, Issue 4, 2007, Pages 740-749

Anomaly detection in TCP/IP networks using immune systems paradigm

Author keywords

Anomaly detection; Artificial immune systems; Detectors generation; TCP IP protocols; Traffic data coding

Indexed keywords

DATA TRANSFER; ENCODING (SYMBOLS); NETWORK PROTOCOLS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33846588283     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.08.016     Document Type: Article
Times cited : (27)

References (22)
  • 1
    • 85090433665 scopus 로고    scopus 로고
    • M. Roesch, Snort: lightweight intrusion detection for networks, in: Proceedings of the 13th Conference on Systems Administration (LISA-99), Seatlle, WA, November 7-12, USENIX, 1999, pp. 229-238.
  • 2
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • Stanford University, Stanford, CA, USA
    • Eskin E. Anomaly detection over noisy data using learned probability distributions. Proceedings of the 17th International Conference on Machine Learning (ICML 2000) (2000), Stanford University, Stanford, CA, USA 255-262
    • (2000) Proceedings of the 17th International Conference on Machine Learning (ICML 2000) , pp. 255-262
    • Eskin, E.1
  • 3
    • 33846571533 scopus 로고    scopus 로고
    • W. Lee, S.J. Stolfo, K.W. Mok, Mining in a data-flow environment: experience in network intrusion detection, in: KDD, 1999, pp. 114-124.
  • 4
    • 33846608350 scopus 로고    scopus 로고
    • R. Agrawal, M. Yoshi, Pnrule: a new framework for learning classifier models in data mining a case study in network intrusion detection, Technical Report RC-21719, IBM Research Division, 2000.
  • 5
    • 79551665842 scopus 로고    scopus 로고
    • Y. Bouzida, S. Gombault, Eigenconnections to intrusion detection, in: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France, 2004, pp. 241-258.
  • 6
    • 45149123910 scopus 로고    scopus 로고
    • S. Axelsson, Visualising intrusions: watching the webserver, in: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France, 2004, pp. 229-274.
  • 7
    • 4344625682 scopus 로고    scopus 로고
    • Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm red teams
    • IEEE Press, Portland, Oregon
    • Dozier G.V., Brown D., Hurley J., and Cain K. Vulnerability analysis of ais-based intrusion detection systems via genetic and particle swarm red teams. Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004), IEEE Press, Portland, Oregon 111-116
    • (2004) Proceedings of the 2004 IEEE Congress on Evolutionary Computation , pp. 111-116
    • Dozier, G.V.1    Brown, D.2    Hurley, J.3    Cain, K.4
  • 8
    • 4344698326 scopus 로고    scopus 로고
    • Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
    • IEEE Press, Portland, Oregon
    • Leon E., Nasraouli O., and Gomez J. Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. Proceedings of the 2004 IEEE Congress on Evolutionary Computation (2004), IEEE Press, Portland, Oregon 502-508
    • (2004) Proceedings of the 2004 IEEE Congress on Evolutionary Computation , pp. 502-508
    • Leon, E.1    Nasraouli, O.2    Gomez, J.3
  • 10
    • 46149127936 scopus 로고
    • The immune system, adaptation, and machine learning
    • Farmer J.D., Packard N.H., and Perelson A.S. The immune system, adaptation, and machine learning. Physica D 22 (1986) 187-204
    • (1986) Physica D , vol.22 , pp. 187-204
    • Farmer, J.D.1    Packard, N.H.2    Perelson, A.S.3
  • 11
    • 0001351468 scopus 로고
    • Using genetic algorithms to explore pattern recognition in the immune system
    • Forrest S., Smith R.E., Javornik B., and Perelson A.S. Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation 1 3 (1993) 191-211
    • (1993) Evolutionary Computation , vol.1 , Issue.3 , pp. 191-211
    • Forrest, S.1    Smith, R.E.2    Javornik, B.3    Perelson, A.S.4
  • 12
    • 0034546374 scopus 로고    scopus 로고
    • Architecture for an artificial immune system
    • Hofmeyr S.A., and Forrest S. Architecture for an artificial immune system. Evolutionary Computation 8 4 (2000) 443-473
    • (2000) Evolutionary Computation , vol.8 , Issue.4 , pp. 443-473
    • Hofmeyr, S.A.1    Forrest, S.2
  • 13
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer networks
    • Dasgupta D., and Gonzales F. An immunity-based technique to characterize intrusions in computer networks. IEEE Transactions on Evolutionary Computation 6 3 (2000) 281-291
    • (2000) IEEE Transactions on Evolutionary Computation , vol.6 , Issue.3 , pp. 281-291
    • Dasgupta, D.1    Gonzales, F.2
  • 16
    • 0031648130 scopus 로고    scopus 로고
    • E. Hart, P. Ross, J. Nelson, Producing robust schedules via an artificial immune system, in: Proceedings of the 1998 IEEE Congress on Evolutionary Computation, 1998, pp. 464-469.
  • 17
    • 0032317988 scopus 로고    scopus 로고
    • D. Dasgupta, An artificial immune system as a multi-agent decision support system, in: IEEE International Conferences on Systems, Man and Cybernetics, 1998, pp. 3816-3820
  • 20
    • 33847119984 scopus 로고    scopus 로고
    • M. Ostaszewski, F. Seredynski, P. Bouvry, A Nonself Space Approach to Network Anomaly Detection, in: Proceedings of NIDISC'06, held in conjuction with IPDPS 2006, Rhodes Island, Greece.
  • 21
    • 33846597238 scopus 로고    scopus 로고
    • D. Rutkowski, Detecting intruders in computer networks using immune system (in polish), Master's thesis, Warsaw University of Technology, 2004.
  • 22
    • 33846614273 scopus 로고    scopus 로고
    • M. Zissman, Darpa intrusion detection evaluation [online], http://www.ll.mit.edu/ist/ideval, Tech. Rep., MIT, 1999.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.