메뉴 건너뛰기




Volumn 2, Issue 3, 2007, Pages

Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems

Author keywords

Adaptive sub eigenspace modeling (ASEM); Agent communications; Agent based distributed system; Intrusion detection; Network security

Indexed keywords

ADAPTIVE SUB-EIGENSPACE MODELING (ASEM); AGENT COMMUNICATIONS; AGENT-BASED DISTRIBUTED SYSTEM;

EID: 35148882671     PISSN: 15564665     EISSN: 15564703     Source Type: Journal    
DOI: 10.1145/1278460.1278463     Document Type: Conference Paper
Times cited : (37)

References (44)
  • 1
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (NIDES): A summary
    • 95. Menlo Park, CA. 28-42
    • ANDERSON, D., FRIVOLD, T., AND VALDES, A. 1995. Next-generation intrusion detection expert system (NIDES): A summary. In SRI International Technical Report. Vol. 95. Menlo Park, CA. 28-42.
    • (1995) SRI International Technical Report
    • ANDERSON, D.1    FRIVOLD, T.2    VALDES, A.3
  • 2
    • 35148897246 scopus 로고
    • Robust classification in high dimensional data
    • Prague, Czech Republic, 2004
    • BRANDEN, K. AND HUBERT, M. 2004. Robust classification in high dimensional data. In Proceedings in Computational Statistics. Prague, Czech Republic, 1925-1932.
    • (1925) Proceedings in Computational Statistics
    • BRANDEN, K.1    HUBERT, M.2
  • 5
    • 80052862897 scopus 로고    scopus 로고
    • CLARK, D. 2001. Rethinking the design of the internet: end to end arguments vs. the brave new world. ACM Trans. Inter. Tech. 1, 1 (Sept.), 70-109.
    • CLARK, D. 2001. Rethinking the design of the internet: end to end arguments vs. the brave new world. ACM Trans. Inter. Tech. 1, 1 (Sept.), 70-109.
  • 6
    • 84858362567 scopus 로고    scopus 로고
    • DARPA, data sets, available at
    • DARPA 2007. Intrusion detection evaluation data sets, available at http://www.ll.mit.edu/.
    • (2007) Intrusion detection evaluation
  • 7
    • 84858346891 scopus 로고    scopus 로고
    • internet traffic generator, available at
    • D-ITG. 2006. Distributed internet traffic generator, available at http://www.grid.umna. it/software/ITG/.
    • (2006) Distributed
    • D-ITG1
  • 8
    • 84964461159 scopus 로고    scopus 로고
    • DASGUPTA, D. AND BRIAN, H. 2001. Mobile security agents for network traffic analysis. In DARPA Information Survivability Conference and Exposition (DISCEX II'01). 2. Anaheim, CA. 332-340.
    • DASGUPTA, D. AND BRIAN, H. 2001. Mobile security agents for network traffic analysis. In DARPA Information Survivability Conference and Exposition (DISCEX II'01). Vol. 2. Anaheim, CA. 332-340.
  • 11
    • 35148877730 scopus 로고    scopus 로고
    • FOUKIA, N., HULAAS, J., AND HARMS, J. 2001. Intrusion detection with mobile agents. In Proceedings of the 11th Annual Internet Society Conference. Stockholm, Sweeden.
    • FOUKIA, N., HULAAS, J., AND HARMS, J. 2001. Intrusion detection with mobile agents. In Proceedings of the 11th Annual Internet Society Conference. Stockholm, Sweeden.
  • 14
    • 84858362904 scopus 로고    scopus 로고
    • available at
    • HAN, B. 2003. Support vector machines, available at http://www.ist.temple.edu/~vucetic/ cis526fall2003/lecture8.doc.
    • (2003) Support vector machines
    • HAN, B.1
  • 16
    • 0027593257 scopus 로고
    • NADIR: An automated system for detecting network intrusions and misuse
    • May
    • HOCHBERG, J., JACKSON, K., STALLINGS, C., MCCLARY, J., DUBOIS, D., AND FORD, J. 1993. NADIR: An automated system for detecting network intrusions and misuse. Comput. Secur. 12, 3 (May), 235-248.
    • (1993) Comput. Secur , vol.12 , Issue.3 , pp. 235-248
    • HOCHBERG, J.1    JACKSON, K.2    STALLINGS, C.3    MCCLARY, J.4    DUBOIS, D.5    FORD, J.6
  • 17
    • 0033243646 scopus 로고    scopus 로고
    • Reference point logistic classification
    • HOOPER, R 1999. Reference point logistic classification. J. Classif. 16, 91-116.
    • (1999) J. Classif , vol.16 , pp. 91-116
    • HOOPER, R.1
  • 18
    • 35148819705 scopus 로고    scopus 로고
    • INSECUREORG. 2006. Nmap free security scanner, tools and hacking resources, available at http://insecure.org.
    • INSECUREORG. 2006. Nmap free security scanner, tools and hacking resources, available at http://insecure.org.
  • 19
    • 35148839934 scopus 로고    scopus 로고
    • JACOBSON, V., LERES, C., AND MCCANNE, S. 2007. Tcpdump, available at anonymous@ftp.ee.lbl. gov.
    • JACOBSON, V., LERES, C., AND MCCANNE, S. 2007. Tcpdump, available at anonymous@ftp.ee.lbl. gov.
  • 21
    • 0141723181 scopus 로고    scopus 로고
    • KDD, Data, available at
    • KDD. 1999. KDD Cup 1999 Data, available at http://kdd.ics.uci.edu/ databases/kddcup99/.
    • (1999) KDD Cup 1999
  • 22
    • 0000911288 scopus 로고    scopus 로고
    • The state of the art in agent communication lan-guages
    • KONE, M., SHIMAZU, A., AND NAKAJIMA, T. 2000. The state of the art in agent communication lan-guages. Knowl. and Inform. Syst. 2, 3, 259-284.
    • (2000) Knowl. and Inform. Syst , vol.2 , Issue.3 , pp. 259-284
    • KONE, M.1    SHIMAZU, A.2    NAKAJIMA, T.3
  • 23
    • 33745907909 scopus 로고    scopus 로고
    • Detecting and visualizing Denial-of-Service and network probe attacks using principal component analysis
    • La Londe, France
    • LABIB, K. AND VEMURI, V. 2004. Detecting and visualizing Denial-of-Service and network probe attacks using principal component analysis. In Third Conference on Security and Network Architectures (SAR'04). La Londe, France.
    • (2004) Third Conference on Security and Network Architectures (SAR'04)
    • LABIB, K.1    VEMURI, V.2
  • 25
    • 84885774862 scopus 로고    scopus 로고
    • LEE, W AND STOLFO, S. 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. 3, 4 (Nov.), 227-261.
    • LEE, W AND STOLFO, S. 2000. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Secur. 3, 4 (Nov.), 227-261.
  • 26
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • LIAO, Y AND VEMURI, V 2002. Use of K-nearest neighbor classifier for intrusion detection. Comput. Secur. 5, 5, 439-448.
    • (2002) Comput. Secur , vol.5 , Issue.5 , pp. 439-448
    • LIAO, Y.1    VEMURI, V.2
  • 27
    • 84858357876 scopus 로고    scopus 로고
    • available at
    • LIBCAP. 2007. Libcap. available at http://www.tcpdump.org.
    • (2007) Libcap
    • LIBCAP1
  • 30
    • 84875379930 scopus 로고    scopus 로고
    • MATHWORKS, available at
    • MATHWORKS. 2007. Matlab. available at http://www.mathworks.com/ matlabcentral/.
    • (2007) Matlab
  • 31
    • 85084161486 scopus 로고    scopus 로고
    • Inferring internet Denial-of-Service activity
    • Washington, D.C
    • MOORE, D., VOELKER, G., AND SAVAGE, S. 2001. Inferring internet Denial-of-Service activity. In Usenix Security Symposium. Washington, D.C 9-22.
    • (2001) Usenix Security Symposium , pp. 9-22
    • MOORE, D.1    VOELKER, G.2    SAVAGE, S.3
  • 33
    • 84858349508 scopus 로고    scopus 로고
    • Irs. available at
    • OXID. 2006. Irs. available at http://http://www.oxid.it/irs. html.
    • (2006)
    • OXID1
  • 36
    • 35148852677 scopus 로고    scopus 로고
    • SINGH, M. 1999. A social semantics for agent communication languages. In Proceedings of IJCAI99 Workshop on Agent Communication Languages. Stockholm, Scandinavia, 75-88.
    • SINGH, M. 1999. A social semantics for agent communication languages. In Proceedings of IJCAI99 Workshop on Agent Communication Languages. Stockholm, Scandinavia, 75-88.
  • 38
    • 0034300682 scopus 로고    scopus 로고
    • SPAFFORD, E. AND ZAMBONI, D. 2000. Intrusion detection using autonomous agents. Comput. Netw. 34, 4 (Oct.), 547-570.
    • SPAFFORD, E. AND ZAMBONI, D. 2000. Intrusion detection using autonomous agents. Comput. Netw. 34, 4 (Oct.), 547-570.
  • 39
    • 84858349507 scopus 로고    scopus 로고
    • TCPTRACE, available at
    • TCPTRACE. 2007. available at http://www.tcptrace.org.
    • (2007)
  • 42
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • VERWORED, T. AND HUNT, R. 2002. Intrusion detection techniques and approaches. Comput. Comm. 25, 1356-1365.
    • (2002) Comput. Comm , vol.25 , pp. 1356-1365
    • VERWORED, T.1    HUNT, R.2
  • 43
    • 84858361154 scopus 로고    scopus 로고
    • available at
    • WEKA. 2007. Weka. available at http://www.cs.waikato.ac.nz/ml/ weka/.
    • (2007) Weka
    • WEKA1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.