메뉴 건너뛰기




Volumn 54, Issue 9, 2006, Pages 3372-3381

A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods

Author keywords

Attack detection; Change point detection; Denial of service; Intrusion detection; Man in the middle; Network security; Network traffic; Nonparametric detection; Port scanning; Sequential tests; Service survivability; Worm

Indexed keywords

ATTACK DETECTION; CHANGE POINT DETECTION; DENIAL OF SERVICE; NETWORK TRAFFIC; NONPARAMETRIC DETECTION; PORT SCANNING; SEQUENTIAL TESTS; SERVICE SURVIVABILITY;

EID: 33947171900     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2006.879308     Document Type: Article
Times cited : (252)

References (38)
  • 2
    • 0011967969 scopus 로고
    • A nonparametric control chart for detecting small disorders
    • P. K. Bhattacharya and D. Frierson, "A nonparametric control chart for detecting small disorders," Ann. Statist., vol. 9, pp. 544-554, 1981.
    • (1981) Ann. Statist , vol.9 , pp. 544-554
    • Bhattacharya, P.K.1    Frierson, D.2
  • 3
    • 1642535783 scopus 로고    scopus 로고
    • A novel approach to detection of 'denial-of-service' attacks via adaptive sequential and batch-sequential change-point detection methods
    • West Point, NY
    • R. Blažek, H. Kim, B. Rozovskii, and A. Tartakovsky, "A novel approach to detection of 'denial-of-service' attacks via adaptive sequential and batch-sequential change-point detection methods," in Proc. 2nd Annu. IEEE Syst., Man, Cybern. Inf. Assurance Workshop, West Point, NY, 2001.
    • (2001) Proc. 2nd Annu. IEEE Syst., Man, Cybern. Inf. Assurance Workshop
    • Blažek, R.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 4
    • 33947143139 scopus 로고    scopus 로고
    • The quickest sequential detection of intrusions in computer networks
    • Salt Lake City, UT, Mar. 12-15
    • _, "The quickest sequential detection of intrusions in computer networks," in Interface 2003, Salt Lake City, UT, Mar. 12-15, 2003.
    • (2003) Interface 2003
    • Blažek, R.1    Kim, H.2    Rozovskii, B.3    Tartakovsky, A.4
  • 7
    • 33947144882 scopus 로고    scopus 로고
    • Daemon9, Route, and Infinity, Project Neptune, Phrack Mag., 7, no. 48, 1996 [Online]. Available: http://www.phrack.org/show. php?p=48&a=13, File 13 of 18
    • Daemon9, Route, and Infinity, "Project Neptune," Phrack Mag., vol. 7, no. 48, 1996 [Online]. Available: http://www.phrack.org/show. php?p=48&a=13, File 13 of 18
  • 8
    • 33947145342 scopus 로고    scopus 로고
    • Adaptive procedures for detecting a change in distribution
    • V. P. Dragalin, "Adaptive procedures for detecting a change in distribution," in Proc. 4th Wuenburg-Umea Conf. Statist., 1996, pp. 87-103.
    • (1996) Proc. 4th Wuenburg-Umea Conf. Statist , pp. 87-103
    • Dragalin, V.P.1
  • 9
    • 0007781352 scopus 로고
    • Fault detection in an ethernet network using anomaly signature matching
    • F. Feather and R. Maxon, "Fault detection in an ethernet network using anomaly signature matching," in ACM Sigcomm, 1993, vol. 23.
    • (1993) ACM Sigcomm , vol.23
    • Feather, F.1    Maxon, R.2
  • 11
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Washington, DC, Aug
    • T. M. Gil and M. Poletter, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp. '01, Washington, DC, Aug. 2001, pp. 23-38.
    • (2001) Proc. USENIX Security Symp. '01 , pp. 23-38
    • Gil, T.M.1    Poletter, M.2
  • 12
    • 21844483359 scopus 로고
    • An efficient sequential nonparametric scheme for detecting a change in distribution
    • L. Gordon and M. Pollak, "An efficient sequential nonparametric scheme for detecting a change in distribution," Ann. Statist., vol. 22, pp. 763-804, 1994.
    • (1994) Ann. Statist , vol.22 , pp. 763-804
    • Gordon, L.1    Pollak, M.2
  • 13
    • 3543113439 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • Karlsruhe, Germany
    • A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. Sigcomm 2003, Karlsruhe, Germany, 2003.
    • (2003) Proc. Sigcomm 2003
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 14
    • 0034588633 scopus 로고    scopus 로고
    • On the trial of intrusions into information systems
    • December
    • S. Kent, "On the trial of intrusions into information systems," IEEE Spectrum, vol. 37, no. 12, pp. 52-56, December 2000.
    • (2000) IEEE Spectrum , vol.37 , Issue.12 , pp. 52-56
    • Kent, S.1
  • 15
    • 0001300222 scopus 로고
    • Sequential changepoint detection in quality control and dynamical systems
    • T. L. Lai, "Sequential changepoint detection in quality control and dynamical systems," J. Roy. Statist. Soc. B, vol. 57, no. 4, pp. 613-658, 1995.
    • (1995) J. Roy. Statist. Soc. B , vol.57 , Issue.4 , pp. 613-658
    • Lai, T.L.1
  • 16
    • 0001524507 scopus 로고
    • Procedures for reacting to a change in distribution
    • G. Lorden, "Procedures for reacting to a change in distribution," Ann. Math. Statist., vol. 42, pp. 1908-1987, 1971.
    • (1971) Ann. Math. Statist , vol.42 , pp. 1908-1987
    • Lorden, G.1
  • 18
    • 0025496255 scopus 로고
    • A Cusum procedure based on sequential ranks
    • D. McDonald, "A Cusum procedure based on sequential ranks," Naval Res. Logist., vol. 37, pp. 627-646, 1990.
    • (1990) Naval Res. Logist , vol.37 , pp. 627-646
    • McDonald, D.1
  • 20
    • 85084161486 scopus 로고    scopus 로고
    • Inferring Internet denial of service activity
    • Washington, DC
    • D. Moore, G. Voelker, and S. Savage, "Inferring Internet denial of service activity," in Proc. USENIX Security Symp., Washington, DC, 2001, pp. 9-22.
    • (2001) Proc. USENIX Security Symp , pp. 9-22
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 21
    • 0002916530 scopus 로고
    • Continuous inspection schemes
    • E. S. Page, "Continuous inspection schemes," Biometrika, vol. 41, pp. 100-115, 1954.
    • (1954) Biometrika , vol.41 , pp. 100-115
    • Page, E.S.1
  • 23
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in realtime
    • V. Paxson, "Bro: A system for detecting network intruders in realtime," Comput. Netw., vol. 31, no. 23-24, pp. 2435-2463, 1999.
    • (1999) Comput. Netw , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 24
    • 0000783098 scopus 로고
    • Optimal detection of a change in distribution
    • M. Pollak, "Optimal detection of a change in distribution," Ann. Statist., vol. 13, pp. 206-227, 1985.
    • (1985) Ann. Statist , vol.13 , pp. 206-227
    • Pollak, M.1
  • 25
    • 0042662831 scopus 로고
    • The expected sample size of some tests of power one
    • H. Robbins and D. Siegmund, "The expected sample size of some tests of power one," Ann. Statist., vol. 2, pp. 415-436, 1974.
    • (1974) Ann. Statist , vol.2 , pp. 415-436
    • Robbins, H.1    Siegmund, D.2
  • 26
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proc. 13th Syst. Admin. Conf. (LISA), 1999, pp. 229-238.
    • (1999) Proc. 13th Syst. Admin. Conf. (LISA) , pp. 229-238
    • Roesch, M.1
  • 27
    • 0002196122 scopus 로고
    • On optimum methods in quickest detection problems
    • A. N. Shiryaev, "On optimum methods in quickest detection problems," Theory Prob. Appl., vol. 8, pp. 22-16, 1963.
    • (1963) Theory Prob. Appl , vol.8 , pp. 22-16
    • Shiryaev, A.N.1
  • 29
    • 33746967507 scopus 로고
    • Efficiency of the generalized Neyman-Pearson test for detecting changes in a multichannel system
    • _, "Efficiency of the generalized Neyman-Pearson test for detecting changes in a multichannel system," Prob. Inf. Transmission, vol. 28, pp. 341-350, 1992.
    • (1992) Prob. Inf. Transmission , vol.28 , pp. 341-350
    • Tartakovsky, A.G.1
  • 30
    • 33747018121 scopus 로고
    • Comparison of some sequential rules for detecting changes in distributions
    • A. G. Tartakovsky and I. A. Ivanova, "Comparison of some sequential rules for detecting changes in distributions," Prob. Inf. Transmission, vol. 28, pp. 117-124, 1992.
    • (1992) Prob. Inf. Transmission , vol.28 , pp. 117-124
    • Tartakovsky, A.G.1    Ivanova, I.A.2
  • 31
    • 0346500982 scopus 로고
    • Asymptotic properties of CUSUM and Shiryaev's procedures for detecting a change in a nonhomogeneous Gaussian process
    • A. G. Tartakovsky, "Asymptotic properties of CUSUM and Shiryaev's procedures for detecting a change in a nonhomogeneous Gaussian process," Math. Meth. Statist., vol. 4, no. 4, pp. 389-404, 1995.
    • (1995) Math. Meth. Statist , vol.4 , Issue.4 , pp. 389-404
    • Tartakovsky, A.G.1
  • 32
    • 33746983029 scopus 로고    scopus 로고
    • Detection of intrusions in information systems by sequential change-point methods
    • A. G. Tartakovsky, B. L. Rozovskii, R. Blazek, and H. Kim, "Detection of intrusions in information systems by sequential change-point methods," Statist. Methodol., vol. 3, no. 3, pp. 252-340, 2006.
    • (2006) Statist. Methodol , vol.3 , Issue.3 , pp. 252-340
    • Tartakovsky, A.G.1    Rozovskii, B.L.2    Blazek, R.3    Kim, H.4
  • 33
    • 33747009728 scopus 로고    scopus 로고
    • Change-point detection in multichannel and distributed systems with applications
    • N. Mukhopadhyay, S. Datta, and S. Chattopadhyay, Eds. New York: Marcel Dekker
    • A. G. Tartakovsky and V. Veeravalli, "Change-point detection in multichannel and distributed systems with applications," in Applications of Sequential Methodologies, N. Mukhopadhyay, S. Datta, and S. Chattopadhyay, Eds. New York: Marcel Dekker, 2004, pp. 339-370.
    • (2004) Applications of Sequential Methodologies , pp. 339-370
    • Tartakovsky, A.G.1    Veeravalli, V.2
  • 34
    • 27144525195 scopus 로고    scopus 로고
    • General asymptotic Bayesian theory of quickest change detection
    • _, "General asymptotic Bayesian theory of quickest change detection," Theory Prob. Appl., vol. 49, no. 3, pp. 458-497, 2005.
    • (2005) Theory Prob. Appl , vol.49 , Issue.3 , pp. 458-497
    • Tartakovsky, A.G.1    Veeravalli, V.2
  • 35
    • 0032643869 scopus 로고    scopus 로고
    • NOMAD: Traffic-based network monitoring framework for anomaly detection
    • R. R. Talpade, G. Kim, and S. Khurana, "NOMAD: Traffic-based network monitoring framework for anomaly detection," in Proc. 4th IEEE Symp. Comput. Commun., 1999, pp. 442-451.
    • (1999) Proc. 4th IEEE Symp. Comput. Commun , pp. 442-451
    • Talpade, R.R.1    Kim, G.2    Khurana, S.3
  • 36
    • 18144385431 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • Dallas, TX
    • V. A. Sins and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," in Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM 2004), Dallas, TX, 2004, vol. 4, pp. 2050-2054.
    • (2004) Proc. IEEE Global Telecommun. Conf. (IEEE GLOBECOM 2004) , vol.4 , pp. 2050-2054
    • Sins, V.A.1    Papagalou, F.2
  • 37
    • 0036343692 scopus 로고    scopus 로고
    • Detecting SYN flooding attacks
    • New York
    • H. Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," in Proc. IEEE Infocom, New York, 2002, pp. 1530-1539.
    • (2002) Proc. IEEE Infocom , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.3
  • 38
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Mar
    • N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through EWMA for autocorrelated and uncorrelated data," IEEE Trans. Reliab., vol. 52, no. 1, pp. 75-82, Mar. 2003.
    • (2003) IEEE Trans. Reliab , vol.52 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.