메뉴 건너뛰기




Volumn 51, Issue 13, 2007, Pages 3935-3955

Network anomaly detection with incomplete audit data

Author keywords

Expectation maximization algorithm; Network anomaly detection; Sampling

Indexed keywords

BLOOM FILTERS; EXPECTATION-MAXIMIZATION; GIGABIT NETWORKS; STOCHASTIC CLUSTERING ALGORITHM FOR NETWORK ANOMALY DETECTION;

EID: 34447280122     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.04.017     Document Type: Article
Times cited : (33)

References (38)
  • 1
    • 34447254426 scopus 로고    scopus 로고
    • B. Yocom, R. Birdsall, D. Poletti-Metzel, Gigabit intrusion detection systems, http://www.nwfusion.com/reviews/2002/1104rev.html, 2002.
  • 3
    • 0033280865 scopus 로고    scopus 로고
    • R. Sekar, Y. Guang, S. Verma, T. Shanbhag, A high-performance network intrusion detection system, in: ACM Conference on Computer and Communications Security, 1999, pp. 8-17.
  • 4
    • 34447269341 scopus 로고    scopus 로고
    • E. Eskin, Anomaly detection over noisy data using learned probability distributions, in: 17th International Conference on Machine Learning, 2000, pp. 255-262.
  • 5
    • 34447270402 scopus 로고    scopus 로고
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, in: D. Barbara, S. Jajodia, (Eds.), Applications of Data Mining in Computer Security, 2002.
  • 6
    • 34447274166 scopus 로고    scopus 로고
    • A.P. Dempster, N.M. Laird, D.B. Rubin, Maximum likelihood from incomplete data via the em algorithm, in: Journal of the Royal Statistical Society, vol. 39 of B, 1977, pp. 1-38.
  • 7
    • 34447290116 scopus 로고    scopus 로고
    • D. Anderson, T.F. Lunt, H. Javitz, A. Tamaru, A. Valdes, Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (nides), Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, 333 Ravenswood Avenue, Menlo Park, CA 94025-3493, May 1994.
  • 8
    • 34447286349 scopus 로고    scopus 로고
    • M. Mahoney, P.K. Chan, Phad: Packet header anomaly detection for identifying hostile network traffic, Technical Report CS-2001-2, Computer Science Department, Florida Institute of Technology, 150W. University Blvd. Melbourne, FL 32901, 2001.
  • 9
    • 34447254879 scopus 로고    scopus 로고
    • M. Mahoney, P.K. Chan, Learning models of network traffic for detecting novel attacks, Technical Report CS-2002-8, Department of Computer Science, Florida Institute of Technology, 150W. University Blvd. Melbourne, FL 32901, 2002.
  • 10
    • 0242456801 scopus 로고    scopus 로고
    • M. Mahoney, P.K. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: SIGKDD, July 2002.
  • 13
    • 0039845384 scopus 로고    scopus 로고
    • S. Ramaswamy, R. Rastogi, K. Shim, Efficient algorithms for mining outliers from large data sets, in: 2000 ACM SIGMOD International Conference on Management of Sata, 2000, pp. 427-438.
  • 14
    • 85084163349 scopus 로고    scopus 로고
    • W. Lee, S. Stolfo, Data mining approaches for intrusion detection, in: 7th USENIX Security Symposium, (San Antonio, TX), 1998.
  • 15
    • 84964411176 scopus 로고    scopus 로고
    • W. Lee, S.J. Stolfo, P.K. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang, Real time data mining-based intrusion detection, in: Second DARPA Information Survivability Conference and Exposition, 2001, pp. 85-100.
  • 17
    • 0036088115 scopus 로고    scopus 로고
    • C. Kruegel, F. Valeur, G. Vigna, R. Kemmerer, Stateful intrusion detection for high-speed networks., in: IEEE Symposium on Research on Security and Privacy, May 2002, pp. 285-294.
  • 18
    • 84950138443 scopus 로고    scopus 로고
    • B. Hutchings, R. Franklin, D. Carver, Assisting network intrusion detection with reconfigurable hardware., in: 10th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, April 2002, pp. 111-120.
  • 19
    • 34447263950 scopus 로고    scopus 로고
    • ISS, BlackICE Sentry Gigabit. Internet Security Solutions, 2001.
  • 20
    • 34447284160 scopus 로고    scopus 로고
    • CISCO, CISCO Intrusion Detection System. Cisco Systems, 2001.
  • 21
    • 34447279571 scopus 로고    scopus 로고
    • T. Networks, Toplayer networks, http://www.toplayer.com/, 2005.
  • 22
    • 85013591309 scopus 로고    scopus 로고
    • W.E. Leland, M.S. Taqq, W. Willinger, D.V. Wilson, On the self-similar nature of Ethernet traffic, in: D.P. Sidhu, (Ed.), ACM SIGCOMM, (San Francisco, CA), 1993, pp. 183-193.
  • 23
    • 0029323403 scopus 로고
    • Wide area traffic: the failure of Poisson modeling
    • Paxson V., and Floyd S. Wide area traffic: the failure of Poisson modeling. IEEE/ACM Transactions on Networking 3 3 (1995) 226-244
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 24
    • 84964555718 scopus 로고    scopus 로고
    • M. Li, W. Jia, W. Zhao, Decision analysis of network based intrusion detection systems for denial-of-service attacks, in: Proceedings of the IEEE Conferences on Info-tech and Info-net, vol. 5, Department of Computer Science, City University of Hong Kong, China, IEEE, October 2001.
  • 25
    • 34447271127 scopus 로고    scopus 로고
    • P. Owezarski, On the impact of DoS attacks on internet traffic characteristics and QoS, in: ICCCN'05: Proceedings of the 14th International Conference on Computer Communications and Networks, LAAS-CNRS, Toulouse, France, IEEE, October 2005, pp. 269-274.
  • 26
    • 34447261767 scopus 로고    scopus 로고
    • H.E. Hurst, Methods of using long-term storage in reservoirs, in: Proceedings of the Institution of Civil Engineers, no. Part 1, 1955, pp. 519-577.
  • 27
    • 0002788893 scopus 로고    scopus 로고
    • A view of the em algorithm that justifies incremental, sparse and other variants
    • Neal R., and Hinton G. A view of the em algorithm that justifies incremental, sparse and other variants. Learning in graphical models (1999) 355-368
    • (1999) Learning in graphical models , pp. 355-368
    • Neal, R.1    Hinton, G.2
  • 28
    • 34447273701 scopus 로고    scopus 로고
    • P. Bradley, U. Fayyad, C. Reina, Scaling em (expectation- maximization) clustering to large databases, Technical Report MSR-TR-98-35, Microsoft Research, 1998.
  • 31
    • 34447252008 scopus 로고    scopus 로고
    • J. MacQueen, Some methods for classification and analysis of multivariate observations, in: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, 1967.
  • 32
    • 0014814325 scopus 로고    scopus 로고
    • B. Bloom, Space/time tradeoffs in hash coding with allowable errors., in: Communications of the ACM, 1970.
  • 33
    • 34447283191 scopus 로고    scopus 로고
    • M.L. Laboratory, Darpa intrusion detection evaluation data set, http://www.ll.mit.edu/.
  • 34
    • 34447275373 scopus 로고    scopus 로고
    • WIDE, The widely integrated distributed environment project, http://tracer.csl.sony.co.jp/mawi/.
  • 36
    • 34447286779 scopus 로고    scopus 로고
    • CERT, Cert advisory ca-1996-21 tcp syn flooding and ip spoofing attacks, http://www.cert.org/advisories/CA-1996-21.html, September 1996.
  • 37
    • 34447284419 scopus 로고    scopus 로고
    • L. Portnoy, E. Eskin, S.J. Stolfo, Intrusion detection with unlabeled data using clustering, in: ACM Workshop on Data Mining Applied to Security, 2001.
  • 38
    • 84890503292 scopus 로고    scopus 로고
    • K. Claffy, G. Polyzos, H. Braum, Application of sampling methodologies to network traffic characterization., in: Computer Communication Review, vol. 4, 1993, pp. 194-203.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.