메뉴 건너뛰기




Volumn 31, Issue 4 SPEC. ISS., 2007, Pages 263-272

An analysis of distributed sensor data aggregation for network intrusion detection

Author keywords

Configuration monitoring; Conversation exchange dynamics; Data mining; Distributed network intrusion detection; Network security; Statistical mechanics

Indexed keywords

COMPUTER NETWORKS; DATA MINING; DISPLAY DEVICES; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; PROGRAM PROCESSORS; STATISTICAL MECHANICS;

EID: 34247342888     PISSN: 01419331     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.micpro.2007.01.001     Document Type: Article
Times cited : (11)

References (19)
  • 1
    • 34247325921 scopus 로고    scopus 로고
    • S. Northcutt, J. Novak, Network Intrusion Detection, New Riders/Pearson, Indianapolis, IN, third ed., 2003.
  • 2
    • 0141762461 scopus 로고    scopus 로고
    • D. Moore, C. Shannon, J. Brown, Code-red: a case study on the spread and victims of an internet worm, in: Proceedings of the second ACM Internet Measurement Workshop, 2002.
  • 3
    • 34247402898 scopus 로고    scopus 로고
    • D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, The spread of the sapphire/slammer worm technical report, CAIDA Technical Report, 2003.
  • 4
    • 34247350693 scopus 로고    scopus 로고
    • S. Axelsson, Intrusion detection systems: a survey and taxonomy, Chalmers University Technical Report, March 2000 pp. 99-15.
  • 5
    • 34247351091 scopus 로고    scopus 로고
    • P. Porras, P. Neumann, EMERALD: event monitoring enabling responses to anomalous live disturbances, in: Proceedings of the 20th National Information Systems Security Conference, Baltimore, MD, October, 1997, pp. 353-365.
  • 6
    • 34247381026 scopus 로고    scopus 로고
    • C. Kruegel, T. Toth, E. Kirda, Sparta - a mobile agent based intrusion detection system, Technical Report, TUV-1841-2002-24, Technical University of Vienna, April 2002.
  • 7
    • 0036804085 scopus 로고    scopus 로고
    • Network Intrusion and fault detection: a statistical anomaly approach
    • Manikopoulos C., and Papavassiliou S. Network Intrusion and fault detection: a statistical anomaly approach. IEEE Network (2002) 76-82
    • (2002) IEEE Network , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 8
    • 84948691334 scopus 로고    scopus 로고
    • P.C. Chan, V.K. Wei, Preemptive distributed intrusion detection using mobile agents, in: Proceedings of the 11th IEEE Internationl Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, Pittsburgh, PA, June 2002, pp. 103-108.
  • 9
    • 33749404535 scopus 로고    scopus 로고
    • P. Kannadiga, M. Zulkernine, DIDMA: a distributed intrusion detection system using mobile agents, in: Proceedings of the 6th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Towson, MD, May 2005, pp. 238-245.
  • 10
    • 4444382384 scopus 로고    scopus 로고
    • Y. Wang, H. Yang, X. Wang, R. Zhang, Distributed intrusion detection system based on data fusion method, in: Proceedings of the 5th World Congress on Intelligent Control and Automation, vol. 5, Hangzhou, China, June 2004, pp. 4331-4334.
  • 11
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-Shafer theory for intrusion detection in ad hoc networks
    • Chen T.M., and Venkataramanan V. Dempster-Shafer theory for intrusion detection in ad hoc networks. IEEE Internet Computing 9 6 (2005) 35-41
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2
  • 12
    • 28444460711 scopus 로고    scopus 로고
    • Y.F. Zhang, Z.Y. Xiong, X.Q. Wang, Distributed intrusion detection based on clustering, in: Proceedings of 2005 International Conference on Machine Learning and Cybernetics, vol. 4, Guangzhou, China, August 2005, pp. 2739-2383.
  • 13
    • 84994296501 scopus 로고    scopus 로고
    • B. Krishnamachari, D. Estrin, S. Wicker, The impact of data aggregation in wireless sensor networks, in: International Workshop on Distributed Event-based Systems, Vienna, Austria, July 2002, pp. 575-578.
  • 14
    • 0036969415 scopus 로고    scopus 로고
    • E. Duarte-Melo, M. Liu, Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks, in: Proceedings of the IEEE Global Communication Conference, vol. 1, November 2002, pp. 21-25.
  • 15
    • 10744223024 scopus 로고    scopus 로고
    • M. Conti, G. Maselli, G. Turi, S. Giordano, Cross-layering in mobile ad-hoc network design, in: the Proceedings of the SensSys 2003, vol. 37, February 2003, pp. 48-51.
  • 17
    • 0036999119 scopus 로고    scopus 로고
    • S.D. Donald, R.V. McMillen, D.K. Ford, J.C. McEachen, Therminator 2: A real-time system for patternless intrusion detection,in: Proceedings of the IEEE Military Comms. Conference (MILCOM 2002), Los Angeles, October 2002, pp. 1498-1502.
  • 18
    • 34247367523 scopus 로고    scopus 로고
    • Massachusetts Institute of Technology, Lincoln Laboratory, DARPA Intrusion Detection Evaluation, , last accessed October 1, 2005.
  • 19
    • 34247342520 scopus 로고    scopus 로고
    • D. Ford, Application of thermodynamics to the reduction of data generated by a non-standard system, arXiv.org, Cornell University, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.