메뉴 건너뛰기




Volumn , Issue , 2007, Pages 17-22

Authentication anomaly detection: A case study on a virtual private network

Author keywords

Anomaly detection; Authentication; Data mining; Security; Virtual private network

Indexed keywords

DATA MINING; MATHEMATICAL MODELS; NETWORK SECURITY; PERSONAL COMMUNICATION SYSTEMS; VIRTUAL REALITY;

EID: 34548268064     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1269880.1269886     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Technical report, National Institute of Standards and Technology
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, National Institute of Standards and Technology, 1980.
    • (1980)
    • Anderson, J.P.1
  • 2
    • 38149079272 scopus 로고    scopus 로고
    • Understanding the insider threat
    • Santa Monica, CA, USA, RAND National Security Research Division
    • R. C. Brackney and R. H. Anderson. Understanding the insider threat. In Proceedings of a March 2004 Workshop, pages 1-137, Santa Monica, CA, USA, 2004. RAND National Security Research Division.
    • (2004) Proceedings of a March 2004 Workshop , pp. 1-137
    • Brackney, R.C.1    Anderson, R.H.2
  • 3
    • 84893496533 scopus 로고    scopus 로고
    • J. D. Brutlag. Aberrant behavior detection in time series for network monitoring. In LISA '00: Proceedings of the 14th USENIX Conference on System Administration, pages 139-146, Berkeley, CA, USA, 2000. USENIX Association.
    • J. D. Brutlag. Aberrant behavior detection in time series for network monitoring. In LISA '00: Proceedings of the 14th USENIX Conference on System Administration, pages 139-146, Berkeley, CA, USA, 2000. USENIX Association.
  • 5
    • 34548255772 scopus 로고    scopus 로고
    • Geo::distance perl module, 2005. Retreived on
    • October 8, from http:///bluefeet/Geo-Distance-0.11/Distance.pm
    • A. C Deltac. Geo::distance perl module, 2005. Retreived on October 8, 2006 from http://search.cpan.org/bluefeet/Geo-Distance-0.11/Distance.pm.
    • (2006)
    • Deltac, A.C.1
  • 7
    • 34548291842 scopus 로고    scopus 로고
    • K. Leung and C Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proc. 28th Australasian CS Conf., 38 of CRPITV, 2005.
    • K. Leung and C Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proc. 28th Australasian CS Conf., volume 38 of CRPITV, 2005.
  • 8
    • 34548292849 scopus 로고    scopus 로고
    • Retrieved on October 8, 2006 from
    • MaxMind. Geolite city, 2006. Retrieved on October 8, 2006 from http://www.maxmind.com/app/geolitecity.
    • (2006)
  • 9
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. A CM Trans
    • J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. A CM Trans. Inf. Syst. Secur., 3(4):262-294, 2000.
    • (2000) Inf. Syst. Secur , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 10
    • 34548289755 scopus 로고    scopus 로고
    • P. Meli, V. Hu, R. Lippmann, J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. 2003. NIST IR 7046.
    • P. Meli, V. Hu, R. Lippmann, J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. 2003. NIST IR 7046.
  • 15
    • 34548252775 scopus 로고    scopus 로고
    • N. Z. University of Waikato. Waikato environment for data analysis v3.5.3, 2005. Retrieved on October 8, 2006 from http://www.cs.waikato.ac.nz/ml/ weka/.
    • N. Z. University of Waikato. Waikato environment for data analysis v3.5.3, 2005. Retrieved on October 8, 2006 from http://www.cs.waikato.ac.nz/ml/ weka/.
  • 16
    • 0003957032 scopus 로고    scopus 로고
    • Data Mining: Practical Machine Learning Tools and Techniques
    • Morgan Kaufmann, second edition, June
    • I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, second edition, June 2005.
    • (2005) Morgan Kaufmann Series in Data Management Systems
    • Witten, I.H.1    Frank, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.