메뉴 건너뛰기




Volumn 56, Issue 6 II, 2007, Pages 3912-3923

Detection of fraudulent usage in wireless networks

Author keywords

Bayes methods; Bayesian decision rule; Instance based learning (IBL); Intrusion detection; Learning systems; Security; Wireless network

Indexed keywords

CELLULAR RADIO SYSTEMS; INTRUSION DETECTION; LEARNING SYSTEMS; MOBILE TELECOMMUNICATION SYSTEMS; PROBABILITY DENSITY FUNCTION;

EID: 36749008467     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2007.901875     Document Type: Article
Times cited : (24)

References (27)
  • 1
    • 33746368048 scopus 로고    scopus 로고
    • Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks
    • May
    • B. Sun, F. Yu, K. Wu, Y. Xiao and V.C.M. Leung, "Enhancing Security using Mobility-Based Anomaly Detection in Cellular Mobile Networks," IEEE Trans. Vehicular Technology, Vol. 55, No. 3, May 2006, pp. 1385-1396.
    • (2006) IEEE Trans. Vehicular Technology , vol.55 , Issue.3 , pp. 1385-1396
    • Sun, B.1    Yu, F.2    Wu, K.3    Xiao, Y.4    Leung, V.C.M.5
  • 2
    • 18844459283 scopus 로고    scopus 로고
    • Potential Fraudulent Usage in Mobile Telecommunications Networks
    • Y.-B. Lin, M. Chen, and H. Rao, "Potential Fraudulent Usage in Mobile Telecommunications Networks," IEEE Transactions on Mobile Computing Vol. 1, No. 2, 2002, pp. 123-131.
    • (2002) IEEE Transactions on Mobile Computing , vol.1 , Issue.2 , pp. 123-131
    • Lin, Y.-B.1    Chen, M.2    Rao, H.3
  • 3
    • 17144430885 scopus 로고    scopus 로고
    • Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol
    • March
    • M. Zhang, and Y. Fang, "Security Analysis and Enhancements of 3GPP Authentication and Key Agreement Protocol," IEEE Transactions on Wireless Communication, Vol.4, No.2, March 2005, pp. 734-742.
    • (2005) IEEE Transactions on Wireless Communication , vol.4 , Issue.2 , pp. 734-742
    • Zhang, M.1    Fang, Y.2
  • 4
    • 0034226287 scopus 로고    scopus 로고
    • A Revised Taxonomy for Intrusion-Detection Systems
    • H. Debar, M. Dacier, and A. Wespi, "A Revised Taxonomy for Intrusion-Detection Systems," Annales des Telecommunications, Vol. 55, 2000, pp. 361-378.
    • (2000) Annales des Telecommunications , vol.55 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 7
    • 0032630098 scopus 로고    scopus 로고
    • Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
    • Oakland, CA, May
    • U. Lindqvist, and P. A. Porras, "Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)," Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, May 1999, pp. 146-161.
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.A.2
  • 12
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: An Intrusion Detection Architecture for Mobile Networks
    • Sept
    • D. Samfat, and R. Molva, "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE Journal on Selected Areas in Communications, Vol. 15, No. 7, Sept. 1997, pp. 1373-1380.
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 14
    • 0031358998 scopus 로고    scopus 로고
    • Modeling PCS Networks Under General Call Holding Time and Cell Residence Time Distributions
    • Y. Fang, I. Chlamtac, and Y. Lin, "Modeling PCS Networks Under General Call Holding Time and Cell Residence Time Distributions," IEEE Tran. on Networking, Vol. 5, No. 6, 1997.
    • (1997) IEEE Tran. on Networking , vol.5 , Issue.6
    • Fang, Y.1    Chlamtac, I.2    Lin, Y.3
  • 16
    • 0002688690 scopus 로고    scopus 로고
    • Discovery of Fraud Rules for Telecommunications Challenges and Solutions
    • San Diego, CA
    • S. Rosset, U. Murad, E. Neumann, Y. Idan, and G. Pinkas, "Discovery of Fraud Rules for Telecommunications Challenges and Solutions", ACM SIGKDD, San Diego, CA, 1999, pp. 409-413.
    • (1999) ACM SIGKDD , pp. 409-413
    • Rosset, S.1    Murad, U.2    Neumann, E.3    Idan, Y.4    Pinkas, G.5
  • 20
    • 84255186507 scopus 로고    scopus 로고
    • How to Increase Security in Mobile Networks by Anomaly Detection
    • Scottsdale, AZ
    • R. Büschkes, D. Kesdogan, and P. Reichl, "How to Increase Security in Mobile Networks by Anomaly Detection", ACRAC'98, Scottsdale, AZ, 1998, pp. 3-12.
    • (1998) ACRAC'98 , pp. 3-12
    • Büschkes, R.1    Kesdogan, D.2    Reichl, P.3
  • 21
    • 21644482790 scopus 로고    scopus 로고
    • Worm Detection, Early Warning and Response Based on Local Victim Information
    • Tucson, Arizona, USA. December 6-10
    • G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley, "Worm Detection, Early Warning and Response Based on Local Victim Information", ACRAC'04, Tucson, Arizona, USA. December 6-10, 2004.
    • (2004) ACRAC'04
    • Gu, G.1    Sharif, M.2    Qin, X.3    Dagon, D.4    Lee, W.5    Riley, G.6
  • 22
    • 14844319067 scopus 로고    scopus 로고
    • Anomaly Detection of Web-based Attacks
    • Washington D.C
    • C. Kruegel, and G. Vigna, "Anomaly Detection of Web-based Attacks", ACM CCS'03, Washington D.C., 2003, pp. 251-261.
    • (2003) ACM CCS'03 , pp. 251-261
    • Kruegel, C.1    Vigna, G.2
  • 23
    • 2542616812 scopus 로고    scopus 로고
    • Quest for Personal Control over Mobile Location Privacy
    • May
    • Q. He, D. Wu, and P. Khosla, "Quest for Personal Control over Mobile Location Privacy," IEEE Communications Magazine, Vol. 42, No. 5, May 2004, pp. 130-136.
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 24
    • 4944258275 scopus 로고    scopus 로고
    • Some Notes on Space, Location and Travel Behaviour
    • Monte Verita, Ascona
    • S. Schonfelder, "Some Notes on Space, Location and Travel Behaviour", Swiss Transport Research Conference, Monte Verita, Ascona, 2001.
    • (2001) Swiss Transport Research Conference
    • Schonfelder, S.1
  • 25
    • 0033795211 scopus 로고    scopus 로고
    • Development of a Transit Network from a Street Map Database with Spatial Analysis and Dynamic Segmentation
    • January
    • K. Choi, and W. Jang, "Development of a Transit Network from a Street Map Database with Spatial Analysis and Dynamic Segmentation," Transport Research Part C Emerging Technologies, Vol. 8, No. 1, pp. 129-146, January 2000.
    • (2000) Transport Research Part C Emerging Technologies , vol.8 , Issue.1 , pp. 129-146
    • Choi, K.1    Jang, W.2
  • 26
    • 77949731575 scopus 로고    scopus 로고
    • Temporal Sequence Learning and Data Reduction for Anomaly Detection
    • August
    • T. Lane, and C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Transactions on Information and System Security (TISSEC), Vol. 2, No. 3, August 1999, pp. 295-331.
    • (1999) ACM Transactions on Information and System Security (TISSEC) , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 27
    • 36749082203 scopus 로고    scopus 로고
    • T.M. Mitchell, Machine Learning, McGraw Hill, 1997, ISBN, 0-07-042-807-7.
    • T.M. Mitchell, "Machine Learning", McGraw Hill, 1997, ISBN, 0-07-042-807-7.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.