메뉴 건너뛰기




Volumn 12, Issue 1, 2007, Pages 56-67

Adaptive real-time anomaly detection with incremental clustering

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE CONTROL SYSTEMS; ALGORITHMS; DATA STRUCTURES; INTERNET PROTOCOLS; TELECOMMUNICATION SYSTEMS;

EID: 34249731961     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2007.02.004     Document Type: Article
Times cited : (45)

References (25)
  • 1
    • 33847767196 scopus 로고    scopus 로고
    • Safeguarding SCADA systems with anomaly detection
    • Proceedings of mathematical methods, models and architectures for computer network security, Springer Verlag
    • Bigham J., Gamez D., and Lu N. Safeguarding SCADA systems with anomaly detection. Proceedings of mathematical methods, models and architectures for computer network security. Lecture notes in computer science vol. 2776 (2003), Springer Verlag 171-182
    • (2003) Lecture notes in computer science , vol.2776 , pp. 171-182
    • Bigham, J.1    Gamez, D.2    Lu, N.3
  • 2
    • 10444267476 scopus 로고    scopus 로고
    • Bishop M. How to sanitize data. In: Proceedings of international workshops on enabling technologies: infrastructures for collaborative enterprises (WETICE04), IEEE Computer Society; June 2004.
  • 3
    • 34249706448 scopus 로고    scopus 로고
    • Linköping University. 91-85497-23-1 [Licentiate thesis, number 1231]. Available at: .
    • Burbeck K. Adaptive real-time anomaly detection for safeguarding critical networks (February 2006), Linköping University. 91-85497-23-1. http://www.diva-portal.org/liu/abstract.xsql?dbid=5973 [Licentiate thesis, number 1231]. Available at: .
    • (2006) Adaptive real-time anomaly detection for safeguarding critical networks
    • Burbeck, K.1
  • 5
    • 10444228269 scopus 로고    scopus 로고
    • Chyssler T, Nadjm-Tehrani S, Burschka S, Burbeck K. Alarm reduction and correlation in defence of IP networks. In: Proceedings of the international workshops on enabling technologies: infrastructures for collaborative enterprises (WETICE04), IEEE Computer Society; June 2004.
  • 6
    • 0038428854 scopus 로고    scopus 로고
    • Results of the KDD'99 classifier learning
    • Elkan C. Results of the KDD'99 classifier learning. ACM SIGKDD Explorations 1 2 (January 2000) 63-64
    • (2000) ACM SIGKDD Explorations , vol.1 , Issue.2 , pp. 63-64
    • Elkan, C.1
  • 7
    • 34249734903 scopus 로고    scopus 로고
    • F-secure. Available at: [accessed August 2005].
  • 9
    • 0141540496 scopus 로고    scopus 로고
    • Guan Y, Ghorbani AA, Belacel N. Y-means: a clustering method for intrusion detection. In: Proceedings of the IEEE Canadian conference on electrical and computer engineering; May 2003.
  • 13
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security (TISSEC) 6 4 (November 2003) 443-471
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.4 , pp. 443-471
    • Julisch, K.1
  • 14
    • 84958970105 scopus 로고    scopus 로고
    • The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
    • Proceedings of recent advances in intrusion detection (RAID'02), Springer Verlag
    • Lippmann R., Webster S.E., and Stetson D. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. Proceedings of recent advances in intrusion detection (RAID'02). Lecture notes in computer science vol. 2516 (2002), Springer Verlag 307-326
    • (2002) Lecture notes in computer science , vol.2516 , pp. 307-326
    • Lippmann, R.1    Webster, S.E.2    Stetson, D.3
  • 15
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
    • Proceedings of the recent advances in intrusion detection (RAID'03), Springer Verlag
    • Mahoney M.V., and Chan P.K. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. Proceedings of the recent advances in intrusion detection (RAID'03). Lecture notes in computer science vol. 2822 (September 2003), Springer Verlag 220-237
    • (2003) Lecture notes in computer science , vol.2822 , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 16
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3 4 (2000) 262-294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 17
    • 34249691361 scopus 로고    scopus 로고
    • Correlation of intrusion symptoms: an application of chronicles
    • Proceedings of the recent advances in intrusion detection (RAID'03), Springer Verlag
    • Morin B., and Hervé H. Correlation of intrusion symptoms: an application of chronicles. Proceedings of the recent advances in intrusion detection (RAID'03). Lecture notes in computer science vol. 2822 (September 2003), Springer Verlag 220-237
    • (2003) Lecture notes in computer science , vol.2822 , pp. 220-237
    • Morin, B.1    Hervé, H.2
  • 18
    • 0036085392 scopus 로고    scopus 로고
    • Mukkamala S, Janoski G, Sung A. Intrusion detection using neural networks and support vector machines. In: Proceedings of international joint conference on neural networks (IJCNN '02); May 2002. p. 1702-7.
  • 19
    • 33745462600 scopus 로고    scopus 로고
    • Munson JC, Wimer S. Watcher: the missing piece of the security puzzle. In: Proceedings of the 17th annual computer security applications conference; December 2001. p. 230-9. Available at: .
  • 20
    • 34249653151 scopus 로고    scopus 로고
    • Portnoy L, Eskin E, Stolfo S. Intrusion detection with unlabeled data using clustering. In: ACM workshop on data mining applied to security; November 2001.
  • 21
    • 0038011179 scopus 로고    scopus 로고
    • Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, et al. Specification based anomaly detection: a new approach for detecting network intrusions. In: Proceedings of the ACM conference on computer and communications security; 25-29 October 2002. p. 265-74.
  • 22
    • 0242456797 scopus 로고    scopus 로고
    • Sequeira K, Zaki M. ADMIT: anomaly-based data mining for intrusions. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining; 23-26 July 2002. p. 386-95.
  • 23
    • 0038819499 scopus 로고    scopus 로고
    • A taxonomy for information security technologies
    • Venter H.S., and Eloff J.H.P. A taxonomy for information security technologies. Computers and Security 22 4 (2003) 299-307
    • (2003) Computers and Security , vol.22 , Issue.4 , pp. 299-307
    • Venter, H.S.1    Eloff, J.H.P.2
  • 24
    • 33646179175 scopus 로고    scopus 로고
    • Yegneswaran V, Barford P, Ullrich J. Internet intrusions: global characteristics and prevalence. In: Proceedings of the 2003 ACM SIGMETRICS international conference on measurement and modeling of computer systems, 9-14 June 2003; p. 138-47.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.