메뉴 건너뛰기




Volumn 126, Issue , 2008, Pages 91-113

Intrusion detection in computer systems using multiple classifier systems

Author keywords

Anomaly detection; Intrusion detection system; Multiple classifier system; One class classifier

Indexed keywords


EID: 42449088159     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-540-78981-9_5     Document Type: Conference Paper
Times cited : (12)

References (38)
  • 1
    • 37349085065 scopus 로고    scopus 로고
    • Sensing attacks in computers networks with hidden markov models
    • Perner P ed, Leipzig, Germany. Springer, Berlin/Heidelberg, pp
    • Ariu D, Giacinto G, Perdisci R (2007) Sensing attacks in computers networks with hidden markov models. In: Perner P (ed) Proc the 5th Int Conf Mach Learn Data Mining in Pattern Recognition, Leipzig, Germany. Springer, Berlin/Heidelberg, pp 449-463
    • (2007) Proc the 5th Int Conf Mach Learn Data Mining in Pattern Recognition , pp. 449-463
    • Ariu, D.1    Giacinto, G.2    Perdisci, R.3
  • 2
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • Baum LE, Petrie T, Soules G, Weiss N (1970) A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann Math Stat 41:164-171
    • (1970) Ann Math Stat , vol.41 , pp. 164-171
    • Baum, L.E.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 3
    • 9244243116 scopus 로고    scopus 로고
    • Semi-supervised learning of classifiers: Theory, algorithms and their applications to human-computer interaction
    • Cohen I, Cozman FG, Sebe N, Cirelo MC, Huang T (2004) Semi-supervised learning of classifiers: Theory, algorithms and their applications to human-computer interaction. IEEE Trans Pattern Analysis and Mach Intell 26:1553-1567
    • (2004) IEEE Trans Pattern Analysis and Mach Intell , vol.26 , pp. 1553-1567
    • Cohen, I.1    Cozman, F.G.2    Sebe, N.3    Cirelo, M.C.4    Huang, T.5
  • 4
    • 27244448490 scopus 로고    scopus 로고
    • Network intrusion detection by a multi-stage classification system
    • Roli F, Kittler J, Windeatt T eds, Cagliari, Italy. Springer, Berlin/Heidelberg, pp
    • Cordella LP, Limongiello A, Sansone C (2004) Network intrusion detection by a multi-stage classification system. In: Roli F, Kittler J, Windeatt T (eds) Proc the 5th Int Workshop Multiple Classifier Syst, Cagliari, Italy. Springer, Berlin/Heidelberg, pp 324-333
    • (2004) Proc the 5th Int Workshop Multiple Classifier Syst , pp. 324-333
    • Cordella, L.P.1    Limongiello, A.2    Sansone, C.3
  • 5
    • 0026850007 scopus 로고
    • A neural network component for an intrusion detection system
    • Oakland, CA, USA. IEEE Computer Society, Los Alamitos, pp
    • Debar H, Becker M, Siboni D (1992) A neural network component for an intrusion detection system. In: Proc 1992 IEEE Symp Research in Security and Privacy, Oakland, CA, USA. IEEE Computer Society, Los Alamitos, pp 240-250
    • (1992) Proc 1992 IEEE Symp Research in Security and Privacy , pp. 240-250
    • Debar, H.1    Becker, M.2    Siboni, D.3
  • 8
    • 0038428854 scopus 로고    scopus 로고
    • Results of the KDD'99 classifier learning
    • Elkan C (2000) Results of the KDD'99 classifier learning. ACM SIGKDD Explorations 1:63-64
    • (2000) ACM SIGKDD Explorations , vol.1 , pp. 63-64
    • Elkan, C.1
  • 9
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • Barbara D, Jajodia S eds, Springer, Berlin/Heidelberg
    • Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Barbara D, Jajodia S (eds) Applications of Data Mining in Computer Security. Springer, Berlin/Heidelberg
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 10
    • 27244444099 scopus 로고    scopus 로고
    • A modular multiple classifier system for the detection of intrusions in computer networks
    • Windeatt T, Roli F eds, Guildford, UK. Springer, Berlin/Heidelberg, pp
    • Giacinto G, Roli F, Didaci L (2003) A modular multiple classifier system for the detection of intrusions in computer networks. In: Windeatt T, Roli F (eds) Proc the 4th Int Workshop Multiple Classifier Syst, Guildford, UK. Springer, Berlin/Heidelberg, pp. 346-355
    • (2003) Proc the 4th Int Workshop Multiple Classifier Syst , pp. 346-355
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 11
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • Giacinto G, Roli F, Didaci L (2003) Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24:1795-1803
    • (2003) Pattern Recognition Letters , vol.24 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 12
    • 35348821822 scopus 로고    scopus 로고
    • Intrusion detection in computer networks by a modular ensemble of one-class classifiers
    • Giacinto G, Perdisci R, Del Rio M, Roli F (2008) Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf Fusion 9:69-82
    • (2008) Inf Fusion , vol.9 , pp. 69-82
    • Giacinto, G.1    Perdisci, R.2    Del Rio, M.3    Roli, F.4
  • 14
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • SRI Int
    • Javits H, Valdes A (1993) The NIDES statistical component: Description and justification. SRI Annual Rep A010, Comp Sci Lab, SRI Int
    • (1993) SRI Annual Rep A010, Comp Sci Lab
    • Javits, H.1    Valdes, A.2
  • 19
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W, Stolfo S (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security 3: 227-261
    • (2000) ACM Trans Inf Syst Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.2
  • 20
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Oakland, CA, USA, IEEE Computer Society, Los Alamitos, pp
    • Lee W, Xiang D (2001) Information-theoretic measures for anomaly detection. In: Proc 2001 IEEE Symp Security and Privacy, Oakland, CA, USA, IEEE Computer Society, Los Alamitos, pp 130-143
    • (2001) Proc 2001 IEEE Symp Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 21
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • Estivill-Castro V ed, Newcastle, NSW, Australia. Australian Computer Society, pp
    • Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Estivill-Castro V (ed) Proc the 28th Australasian Comp Sci Conf, Newcastle, NSW, Australia. Australian Computer Society, pp 333-342
    • (2005) Proc the 28th Australasian Comp Sci Conf , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 23
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
    • Vigna G, Jonsson E, Krügel C eds, Pittsburgh, PA, USA. Springer, Berlin/Heidelbeg, pp
    • Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna G, Jonsson E, Krügel C (eds) Proc 6th Int Symp Recent Advances in Intrusion Detection, Pittsburgh, PA, USA. Springer, Berlin/Heidelbeg, pp 220-237
    • (2003) Proc 6th Int Symp Recent Advances in Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 24
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • McHugh J, Christie A, Allen J (2000) Defending yourself: The role of intrusion detection systems. IEEE Software 17:42-51
    • (2000) IEEE Software , vol.17 , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 25
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Security 3:262-294
    • (2000) ACM Trans Inf Syst Security , vol.3 , pp. 262-294
    • McHugh, J.1
  • 27
    • 39049123726 scopus 로고    scopus 로고
    • An Achilles' heel in signature-based IDS: Squealing false positives in SNORT
    • Lee W, Mé L, Wespi A eds, Davis, CA, USA. Springer, Berlin/Heidelberg
    • Patton S, Yurcik W, Doss D (2001) An Achilles' heel in signature-based IDS: Squealing false positives in SNORT. In: Lee W, Mé L, Wespi A (eds) Proc the 4th Int Symp Recent Advances in Intrusion Detection, Davis, CA, USA. Springer, Berlin/Heidelberg
    • (2001) Proc the 4th Int Symp Recent Advances in Intrusion Detection
    • Patton, S.1    Yurcik, W.2    Doss, D.3
  • 32
    • 84957038175 scopus 로고    scopus 로고
    • Combining one-class classifiers
    • Kittler J, Roli F eds, Cambridge, UK. Springer, Berlin/Heidelberg, pp
    • Tax DMJ, Duin RPW (2001) Combining one-class classifiers. In: Kittler J, Roli F (eds) Proc the 2nd Multiple Classifier Syst, Cambridge, UK. Springer, Berlin/Heidelberg, pp 299-308
    • (2001) Proc the 2nd Multiple Classifier Syst , pp. 299-308
    • Tax, D.M.J.1    Duin, R.P.W.2
  • 35
    • 14844322335 scopus 로고    scopus 로고
    • Testing network-based intrusion detection signatures using mutant exploits
    • Atluri V, Pfitzmann B, McDaniel PD eds, Washington DC, USA. ACM, New York, pp
    • Vigna G, Robertson W, Balzarotti D (2004) Testing network-based intrusion detection signatures using mutant exploits. In: Atluri V, Pfitzmann B, McDaniel PD (eds) Proc the 11th ACM Conf Comp and Communications Security, Washington DC, USA. ACM, New York, pp 21-30
    • (2004) Proc the 11th ACM Conf Comp and Communications Security , pp. 21-30
    • Vigna, G.1    Robertson, W.2    Balzarotti, D.3
  • 36
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Jonsson E, Valdes A, Almgren M eds, Sophia Antipolis, France. Springer, Berlin/Heidelberg, pp
    • Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M (eds) Proc the 7th Int Symp Recent Advances on Intrusion Detection, Sophia Antipolis, France. Springer, Berlin/Heidelberg, pp 203-222
    • (2004) Proc the 7th Int Symp Recent Advances on Intrusion Detection , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 37
    • 42449146881 scopus 로고    scopus 로고
    • Controlling intrusion detection systems by generating false positives: Squealing proof-of-concept
    • Tampa, FL, USA. IEEE Computer Society, Los Alamitos, pp
    • Yurcik W (2002) Controlling intrusion detection systems by generating false positives: Squealing proof-of-concept. In: Proc the 27th Annual IEEE Conf Local Comp Networks, Tampa, FL, USA. IEEE Computer Society, Los Alamitos, pp 134-135
    • (2002) Proc the 27th Annual IEEE Conf Local Comp Networks , pp. 134-135
    • Yurcik, W.1
  • 38
    • 0026860706 scopus 로고
    • Methods of combining multiple classifiers and their applications to handwriting recognition
    • Xu L, Krzyzak A, Suen CY (1992) Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Trans Syst Man Cybern 22:418-435
    • (1992) IEEE Trans Syst Man Cybern , vol.22 , pp. 418-435
    • Xu, L.1    Krzyzak, A.2    Suen, C.Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.