메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 105-112

Creation and deployment of data mining-based intrusion detection systems in oracle database 10g

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER NETWORKS; RELATIONAL DATABASE SYSTEMS; RELIABILITY; SECURITY OF DATA;

EID: 33847261658     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMLA.2005.17     Document Type: Conference Paper
Times cited : (21)

References (26)
  • 1
    • 0142253852 scopus 로고    scopus 로고
    • Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24.
    • Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24.
  • 4
    • 33847110801 scopus 로고    scopus 로고
    • DataDirect Technologies
    • DataDirect Technologies, Using Oracle Real Application Clusters (RAC), http://www.datadirect.com/techzone/odbc/docs/odbc_oracle_rac.pdf, 2004.
    • (2004) Using Oracle Real Application Clusters (RAC)
  • 5
    • 33847328806 scopus 로고    scopus 로고
    • DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003.
    • DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003.
  • 6
    • 0141797880 scopus 로고    scopus 로고
    • A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
    • D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
    • Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S. J., A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 78-99.
    • (2002) Applications of Data Mining in Computer Security , pp. 78-99
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.J.5
  • 8
    • 1642375563 scopus 로고    scopus 로고
    • Adaptive Model Generation, an Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems
    • D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
    • Honig, A., Howard, A., Eskin, E., and Stolfo, S. J., Adaptive Model Generation, an Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 154-191.
    • (2002) Applications of Data Mining in Computer Security , pp. 154-191
    • Honig, A.1    Howard, A.2    Eskin, E.3    Stolfo, S.J.4
  • 12
    • 33847329301 scopus 로고    scopus 로고
    • KDD'99 Competition Dataset, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 1999.
    • KDD'99 Competition Dataset, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 1999.
  • 13
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features and Models for Intrusion Detection Systems
    • Lee, W. and Stolfo, S. J., A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security, 3(4), 2000, pp. 227-261.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 15
    • 0142063407 scopus 로고    scopus 로고
    • Novelty Detection: A review, Part 1: Statistical Approaches
    • Markou, M. and Singh, S., Novelty Detection: A review, Part 1: Statistical Approaches, Signal Processing, 8(12), 2003, pp. 2481-2497.
    • (2003) Signal Processing , vol.8 , Issue.12 , pp. 2481-2497
    • Markou, M.1    Singh, S.2
  • 18
    • 33847298665 scopus 로고    scopus 로고
    • Network Flight Recorder Inc
    • Network Flight Recorder Inc., http://www.nfr.com, 1997.
    • (1997)
  • 19
    • 0038282217 scopus 로고    scopus 로고
    • Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
    • D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
    • Noel, S., Wijesekera, D., and Youman, C., Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Aecurity, Kluwer Academic Publishers, Boston, MA, 2002, pp. 2-25.
    • (2002) Applications of Data Mining in Computer Aecurity , pp. 2-25
    • Noel, S.1    Wijesekera, D.2    Youman, C.3
  • 20
    • 0033295259 scopus 로고    scopus 로고
    • Paxton, V. BRO: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31, 1999, pp. 2435-2463.
    • Paxton, V. BRO: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31, 1999, pp. 2435-2463.
  • 22
    • 0000487102 scopus 로고    scopus 로고
    • Estimating the Support of a High-Dimensional distribution
    • Scholkopf, B., Platt, J. C., Shawe-Taylor, J., and Smola, A. J., Estimating the Support of a High-Dimensional distribution, Neural Computation, 13(7), 2001, pp. 1443-1471.
    • (2001) Neural Computation , vol.13 , Issue.7 , pp. 1443-1471
    • Scholkopf, B.1    Platt, J.C.2    Shawe-Taylor, J.3    Smola, A.J.4
  • 23
    • 0034300682 scopus 로고    scopus 로고
    • Intrusion Detection Using Autonomous Agents
    • Spafford, E. H. and Zamboni, D., Intrusion Detection Using Autonomous Agents, Computer Networks, 34(4), 2000. pp. 547-570.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 547-570
    • Spafford, E.H.1    Zamboni, D.2
  • 26
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Zhang, Y., Lee, W., and Huang, Y.-A., Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks, 9(5), 2003, pp. 545-556.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.-A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.