메뉴 건너뛰기




Volumn 57, Issue 3, 2008, Pages 490-497

Network intrusion detection using CFAR abrupt-change detectors

Author keywords

Cell averaging (CA CFAR); Constant false alarm rate (CFAR); Dempster Shafer; Detector fusion; Intrusion detection; Network traffic model; Optimal CFAR; Order statistics CFAR (OS CFAR)

Indexed keywords

BAYESIAN NETWORKS; COMPUTER SIMULATION; DATA FUSION; GAUSSIAN DISTRIBUTION; TELECOMMUNICATION TRAFFIC;

EID: 40549108657     PISSN: 00189456     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIM.2007.910108     Document Type: Article
Times cited : (15)

References (26)
  • 1
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and review
    • Apr
    • R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and review," Computer, vol. 35, no. 4, pp. 27-30, Apr. 2002.
    • (2002) Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 2
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/Jun
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, "Network intrusion detection," IEEE Netw., vol. 8, no. 3, pp. 26-41, May/Jun. 1994.
    • (1994) IEEE Netw , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 3
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • Sep./Oct
    • J. McHugh, A. Christie, and J. Allen, "Defending yourself: The role of intrusion detection systems," IEEE Softw., vol. 17, no. 5, pp. 42-51, Sep./Oct. 2000.
    • (2000) IEEE Softw , vol.17 , Issue.5 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 4
    • 85008025302 scopus 로고    scopus 로고
    • Detecting attacks on networks
    • Dec
    • C. Herringshaw, "Detecting attacks on networks," Computer, vol. 30, no. 12, pp. 16-17, Dec. 1997.
    • (1997) Computer , vol.30 , Issue.12 , pp. 16-17
    • Herringshaw, C.1
  • 5
    • 0742324903 scopus 로고    scopus 로고
    • A formal framework for positive and negative detection schemes
    • Feb
    • F. Esponda, S. Forrest, and P. Helman, "A formal framework for positive and negative detection schemes," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 34, no. 1, pp. 357-373, Feb. 2004.
    • (2004) IEEE Trans. Syst., Man, Cybern. B, Cybern , vol.34 , Issue.1 , pp. 357-373
    • Esponda, F.1    Forrest, S.2    Helman, P.3
  • 6
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion detection via system call traces
    • Sep./Oct
    • A. P. Kosoresow and S. A. Hofmeyer, "Intrusion detection via system call traces," IEEE Softw., vol. 14, no. 5, pp. 35-42, Sep./Oct. 1997.
    • (1997) IEEE Softw , vol.14 , Issue.5 , pp. 35-42
    • Kosoresow, A.P.1    Hofmeyer, S.A.2
  • 7
    • 0242414940 scopus 로고    scopus 로고
    • Intrusion and misuse detection in large-scale systems
    • Jan./Feb
    • R. F. Erbacher, K. L. Walker, and D. A. Frincke, "Intrusion and misuse detection in large-scale systems," IEEE Comput. Graph. Appl., vol. 22, no. 1, pp. 38-47, Jan./Feb. 2002.
    • (2002) IEEE Comput. Graph. Appl , vol.22 , Issue.1 , pp. 38-47
    • Erbacher, R.F.1    Walker, K.L.2    Frincke, D.A.3
  • 8
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Mar
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng. vol. 21, no. 3, pp. 181-199, Mar. 1995.
    • (1995) IEEE Trans. Softw. Eng , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 9
    • 0031190354 scopus 로고    scopus 로고
    • On a pattern-oriented model for intrusion detection
    • Jul./Aug
    • S. P. Shieh and V. D. Gligor, "On a pattern-oriented model for intrusion detection," IEEE Trans. Knowl. Data Eng., vol. 9, no. 4, pp. 661-667, Jul./Aug. 1997.
    • (1997) IEEE Trans. Knowl. Data Eng , vol.9 , Issue.4 , pp. 661-667
    • Shieh, S.P.1    Gligor, V.D.2
  • 10
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic techniques for intrusion detection based on computer audit data
    • Jul
    • N. Ye, X. Y. Li, Q. Chen, S. M. Emran, and M. M. Xu, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274, Jul. 2001.
    • (2001) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.31 , Issue.4 , pp. 266-274
    • Ye, N.1    Li, X.Y.2    Chen, Q.3    Emran, S.M.4    Xu, M.M.5
  • 11
    • 0036588773 scopus 로고    scopus 로고
    • Incorporating soft computing techniques into a probabilistic intrusion detection system
    • May
    • S. B. Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 32, no. 2, pp. 154-160, May 2002.
    • (2002) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev , vol.32 , Issue.2 , pp. 154-160
    • Cho, S.B.1
  • 12
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • Jan
    • K. M. C. Tan and R. A. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. Sel. Areas Commun., vol. 21, no. 1, pp. 96-110, Jan. 2003.
    • (2003) IEEE J. Sel. Areas Commun , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.M.C.1    Maxion, R.A.2
  • 13
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly intrusion detection method based on HMM
    • Jun
    • Y. Qiao, X. W. Xin, Y. Bin, and S. Ge, "Anomaly intrusion detection method based on HMM," Electron. Lett., vol. 38, no. 13, pp. 663-664, Jun. 2002.
    • (2002) Electron. Lett , vol.38 , Issue.13 , pp. 663-664
    • Qiao, Y.1    Xin, X.W.2    Bin, Y.3    Ge, S.4
  • 14
    • 0035402096 scopus 로고    scopus 로고
    • Training a neural-network based intrusion detector to recognize novel attacks
    • Jul
    • S. C. Lee and D. V. Heinbuch, "Training a neural-network based intrusion detector to recognize novel attacks," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 294-299, Jul. 2001.
    • (2001) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.31 , Issue.4 , pp. 294-299
    • Lee, S.C.1    Heinbuch, D.V.2
  • 15
    • 0142071646 scopus 로고    scopus 로고
    • Integrated access control and intrusion detection for Web servers
    • Sep
    • T. Ryutov, C. Neuman, K. Dongho, and Z. Li, "Integrated access control and intrusion detection for Web servers," IEEE Trans. Parallel Distrib. Syst., vol. 14, no. 9, pp. 841-850, Sep. 2003.
    • (2003) IEEE Trans. Parallel Distrib. Syst , vol.14 , Issue.9 , pp. 841-850
    • Ryutov, T.1    Neuman, C.2    Dongho, K.3    Li, Z.4
  • 16
    • 0031235236 scopus 로고    scopus 로고
    • Sensor fusion for intelligent alarm analysis
    • Sep
    • C. L. Nelson and D. S. Fitzgerald, "Sensor fusion for intelligent alarm analysis," IEEE Aerosp. Electron. Syst. Mag., vol. 12, no. 9, pp. 18-24, Sep. 1997.
    • (1997) IEEE Aerosp. Electron. Syst. Mag , vol.12 , Issue.9 , pp. 18-24
    • Nelson, C.L.1    Fitzgerald, D.S.2
  • 17
    • 0031191180 scopus 로고    scopus 로고
    • Traffic models in broadband networks
    • Jul
    • A. Adas, "Traffic models in broadband networks," IEEE Commun. Mag. vol. 35, no. 7, pp. 82-89, Jul. 1997.
    • (1997) IEEE Commun. Mag , vol.35 , Issue.7 , pp. 82-89
    • Adas, A.1
  • 18
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-chain model for cyber-attack detection
    • Mar
    • N. Ye, Y. B. Zhang, and C. M. Borror, "Robustness of the Markov-chain model for cyber-attack detection," IEEE Trans. Rel., vol. 53, no. 1, pp. 116-123, Mar. 2004.
    • (2004) IEEE Trans. Rel , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.B.2    Borror, C.M.3
  • 19
    • 0032761642 scopus 로고    scopus 로고
    • On multimedia networks: Self-similar traffic and network performance
    • Jan
    • Z. Sahinoglu and S. Tekinay, "On multimedia networks: Self-similar traffic and network performance," IEEE Commun. Mag., vol. 37, no. 1, pp. 48-52, Jan. 1999.
    • (1999) IEEE Commun. Mag , vol.37 , Issue.1 , pp. 48-52
    • Sahinoglu, Z.1    Tekinay, S.2
  • 20
    • 0035248163 scopus 로고    scopus 로고
    • Nested auto-regressive processes for MPEG-encoded video traffic modeling
    • Feb
    • D. R. Liu, E. I. Sara, and W. Sun, "Nested auto-regressive processes for MPEG-encoded video traffic modeling," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 2, pp. 169-183, Feb. 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol , vol.11 , Issue.2 , pp. 169-183
    • Liu, D.R.1    Sara, E.I.2    Sun, W.3
  • 21
    • 0026106846 scopus 로고
    • Performances of order statistics CFAR
    • Mar
    • M. Shor and N. Levanon, "Performances of order statistics CFAR," IEEE Trans. Aerosp. Electron. Syst., vol. 27, no. 2, pp. 214-224, Mar. 1991.
    • (1991) IEEE Trans. Aerosp. Electron. Syst , vol.27 , Issue.2 , pp. 214-224
    • Shor, M.1    Levanon, N.2
  • 22
    • 0033352460 scopus 로고    scopus 로고
    • Cell-averaging CFAR detection in compound clutter with spatially correlated texture and speckle
    • Dec
    • M. Barkat and F. Soltani, "Cell-averaging CFAR detection in compound clutter with spatially correlated texture and speckle," Proc. Inst. Electr. Eng. - Radar, Sonar Navig., vol. 146, no. 6, pp. 279-284, Dec. 1999.
    • (1999) Proc. Inst. Electr. Eng. - Radar, Sonar Navig , vol.146 , Issue.6 , pp. 279-284
    • Barkat, M.1    Soltani, F.2
  • 25
    • 0031238325 scopus 로고    scopus 로고
    • A target identification comparison of Bayesian and Dempster-Shafer multisensor fusion
    • Sep
    • D. M. Buede and P. Girardi, "A target identification comparison of Bayesian and Dempster-Shafer multisensor fusion," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 27, no. 5, pp. 569-577, Sep. 1997.
    • (1997) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.27 , Issue.5 , pp. 569-577
    • Buede, D.M.1    Girardi, P.2
  • 26
    • 0033738584 scopus 로고    scopus 로고
    • Bayesian and Dempster-Shafer target identification for radar surveillance
    • Apr
    • H. Leung and J. Wu, "Bayesian and Dempster-Shafer target identification for radar surveillance," IEEE Trans. Aerosp. Electron. Syst., vol. 36, no. 4, pp. 432-446, Apr. 2000.
    • (2000) IEEE Trans. Aerosp. Electron. Syst , vol.36 , Issue.4 , pp. 432-446
    • Leung, H.1    Wu, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.