메뉴 건너뛰기




Volumn 6973, Issue , 2008, Pages

Intrusion signature creation via clustering anomalies

Author keywords

Adaptive signatures; Clustering; Intrusion detection

Indexed keywords

CLASSIFICATION (OF INFORMATION); CLUSTERING ALGORITHMS; COMPUTER CRIME; REAL TIME CONTROL; RELIABILITY THEORY; SUPERVISED LEARNING;

EID: 43249101215     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.775886     Document Type: Conference Paper
Times cited : (28)

References (23)
  • 2
    • 43249087997 scopus 로고    scopus 로고
    • Enterasys Networks Inc
    • Enterasys Networks Inc., "Dragon Intrusion Detection System." http://www.enterasys.com/products/ids/DSHSS7/.
    • Dragon Intrusion Detection System
  • 3
    • 43249130910 scopus 로고    scopus 로고
    • S. International, NIDES (Next-Generation Intrusion Detection Expert System). http://www.csl.sri.com/projects/nides/.
    • S. International, "NIDES (Next-Generation Intrusion Detection Expert System)." http://www.csl.sri.com/projects/nides/.
  • 10
    • 33644860127 scopus 로고    scopus 로고
    • A clustering-based method for unsupervised intrusion detections
    • May
    • S. Jiang, X. Song, H. Wang, J.-J. Han, and Q.-H. Li, "A clustering-based method for unsupervised intrusion detections," Pattern Recognition Letters 27, pp. 802-10, May 2006.
    • (2006) Pattern Recognition Letters , vol.27 , pp. 802-810
    • Jiang, S.1    Song, X.2    Wang, H.3    Han, J.-J.4    Li, Q.-H.5
  • 13
    • 43249096714 scopus 로고    scopus 로고
    • White paper: Deciphering detection techniques: Part ii anomaly-based intrusion detection
    • D. F. Gong, "White paper: Deciphering detection techniques: Part ii anomaly-based intrusion detection," Network Associates, 2003.
    • (2003) Network Associates
    • Gong, D.F.1
  • 14
    • 33751530473 scopus 로고    scopus 로고
    • Effective intrusion detection model through the combination of a signaturebased intrusion detection system and a machine learning-based intrusion detection system
    • I.-Y. Weon, D. H. Song, and C.-H. Lee, "Effective intrusion detection model through the combination of a signaturebased intrusion detection system and a machine learning-based intrusion detection system," Journal of Information Science and Engineering 22(6), pp. 1447-1464, 2006.
    • (2006) Journal of Information Science and Engineering , vol.22 , Issue.6 , pp. 1447-1464
    • Weon, I.-Y.1    Song, D.H.2    Lee, C.-H.3
  • 15
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert Systems with Applications 29(4), pp. 713-22, 2005.
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 20
    • 43249100285 scopus 로고    scopus 로고
    • Case Study: Defending the Nation's Lawmakers Against Cyber Threats and Attacks
    • "Case Study: Defending the Nation's Lawmakers Against Cyber Threats and Attacks," Network Associates, 2003.
    • (2003) Network Associates
  • 23
    • 58049158700 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory
    • MIT Lincoln Laboratory, "1999 DARPA Intrusion Detection Evaluation Data Set," 1999. http://www.ll.mit.edu/IST/ideval/data/1999/ 1999_data_index.html.
    • (1999) DARPA Intrusion Detection Evaluation Data Set


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.