메뉴 건너뛰기




Volumn 2820, Issue , 2003, Pages 220-237

An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

CHEMICAL DETECTION; MERCURY (METAL); SIGNAL DETECTION; STATISTICAL TESTS;

EID: 35248857893     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45248-5_13     Document Type: Review
Times cited : (356)

References (33)
  • 1
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA Off-Line Intrusion Detection Evaluation
    • R. Lippmann, et al., "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4) 579-595, 2000. Data is available at http://www.ll.mit.edu/IST/ideval/
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1
  • 5
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, Model-based Monitoring for Cyber Attack Detection
    • A. Valdes, K. Skinner, "Adaptive, Model-based Monitoring for Cyber Attack Detection", Proc. RAID 2000, 80-92.
    • Proc. RAID 2000 , pp. 80-92
    • Valdes, A.1    Skinner, K.2
  • 6
    • 0141441130 scopus 로고    scopus 로고
    • PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic
    • M. Mahoney, P. K. Chan, "PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic", Florida Tech. technical report CS-2001-04, http://cs.fit.edu/∼tr/
    • Florida Tech. Technical Report CS-2001-04
    • Mahoney, M.1    Chan, P.K.2
  • 7
    • 0242456801 scopus 로고    scopus 로고
    • Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks
    • M. Mahoney, P. K. Chan, "Learning Nonstationary Models of Normal Network Traffic for Detecting Novel Attacks ", Proc. SIGKDD 2002, 376-385.
    • Proc. SIGKDD 2002 , pp. 376-385
    • Mahoney, M.1    Chan, P.K.2
  • 9
    • 0037661195 scopus 로고    scopus 로고
    • Network Traffic Anomaly Detection Based on Packet Bytes
    • M. Mahoney, "Network Traffic Anomaly Detection Based on Packet Bytes", Proc. ACM-SAC 2003.
    • Proc. ACM-SAC 2003
    • Mahoney, M.1
  • 10
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly Detection over Noisy Data using Learned Probability Distributions
    • E. Eskin, "Anomaly Detection over Noisy Data using Learned Probability Distributions", Proc. Intl. Conf. Machine Learning, 2000.
    • (2000) Proc. Intl. Conf. Machine Learning
    • Eskin, E.1
  • 11
    • 0141797880 scopus 로고    scopus 로고
    • A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
    • D. Barbara and S. Jajodia (editors), Kluwer
    • E. Eskin, A. Arnold, M, Prerau, L. Portnoy & S. Stolfo. "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", In D. Barbara and S. Jajodia (editors), Applications of Data Mining in Computer Security, Kluwer, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 15
    • 84945294444 scopus 로고    scopus 로고
    • A Study in the Feasibility of Performing Host-based Anomaly Detection on Windows NT
    • A. Schwartzbard and A.K. Ghosh, "A Study in the Feasibility of Performing Host-based Anomaly Detection on Windows NT", Proc. RAID 1999.
    • Proc. RAID 1999
    • Schwartzbard, A.1    Ghosh, A.K.2
  • 17
    • 85084163313 scopus 로고    scopus 로고
    • Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications
    • R. Sekar and P. Uppuluri, "Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications", Proc. 8th USENIX Security Symposium 1999.
    • Proc. 8th USENIX Security Symposium 1999
    • Sekar, R.1    Uppuluri, P.2
  • 20
    • 0002067431 scopus 로고    scopus 로고
    • NetSTAT: A Network-based Intrusion Detection System
    • IOS Press
    • G. Vigna and R. Kemmerer, "NetSTAT: A Network-based Intrusion Detection System", Journal of Computer Security, 7(1), IOS Press, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.1
    • Vigna, G.1    Kemmerer, R.2
  • 23
    • 0034592923 scopus 로고    scopus 로고
    • On-line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
    • K. Yamanishi, J. Takeuchi & G. Williams, "On-line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms", Proc. KDD 2000, 320-324.
    • Proc. KDD 2000 , pp. 320-324
    • Yamanishi, K.1    Takeuchi, J.2    Williams, G.3
  • 26
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
    • J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory", Proc. ACM TISSEC 3(4) 2000, 262-294.
    • (2000) Proc. ACM TISSEC , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 29
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight Intrusion Detection for Networks
    • M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa 1999.
    • Proc. USENIX Lisa 1999
    • Roesch, M.1
  • 30
    • 35248851338 scopus 로고    scopus 로고
    • Source code for PHAD, ALAD, LERAD, NETAD, SAD, EVAL, TF, TM, and AFIL
    • M. Mahoney, Source code for PHAD, ALAD, LERAD, NETAD, SAD, EVAL, TF, TM, and AFIL is available at http://cs.fit.edu/∼mmahoney/dist/
    • Mahoney, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.