메뉴 건너뛰기




Volumn E87-D, Issue 8, 2004, Pages 2086-2094

A clustering-based anomaly intrusion detector for a host computer

Author keywords

Anomaly detection; Clustering; Data mining; Intrusion detection; User profiling

Indexed keywords

ALGORITHMS; MATHEMATICAL MODELS; RELIABILITY; SECURITY OF DATA; SEMANTICS; STATISTICAL METHODS;

EID: 4344644051     PISSN: 09168532     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (28)
  • 1
    • 0028430224 scopus 로고
    • Network intrusion detection
    • May/June
    • B. Mukherjee, T.L. Heberlein, and K.N. Kevitt, "Network intrusion detection," IEEE Netw., vol.8, no.3, pp.26-41, May/June 1994.
    • (1994) IEEE Netw. , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, T.L.2    Kevitt, K.N.3
  • 2
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system
    • Computer Science Department, University of New Mexico, Aug.
    • R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The architecture of a network level intrusion detection system," Technical Report, Computer Science Department, University of New Mexico, Aug. 1990.
    • (1990) Technical Report
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 3
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • March
    • K. Ilgun, R. Kemmerer, and P.A. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng., vol.21, no.3, pp.181-199, March 1995.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.A.3
  • 4
    • 0002889601 scopus 로고
    • USTAT: A real-time intrusion detection system for UNIX
    • May
    • K. Illgun, "USTAT: A real-time intrusion detection system for UNIX," Proc. 1993 Symposium Security and Privacy, pp.16-28, May 1993.
    • (1993) Proc. 1993 Symposium Security and Privacy , pp. 16-28
    • Illgun, K.1
  • 6
    • 0004118981 scopus 로고
    • The NIDES statistical component description and justification
    • SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March
    • H.S. Javitz and A. Valdes, "The NIDES statistical component description and justification," Annual Report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March 1994.
    • (1994) Annual Report
    • Javitz, H.S.1    Valdes, A.2
  • 7
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Oct.
    • P.A. Porras and P.G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," 20th NISSC, Oct. 1997.
    • (1997) 20th NISSC
    • Porras, P.A.1    Neumann, P.G.2
  • 8
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • San Antonio, Texas, Jan.
    • W. Lee and S. Stolfo, "Data mining approaches for intrusion detection," Proc. 7th USENIX Security Symposium, San Antonio, Texas, Jan. 1998.
    • (1998) Proc. 7th USENIX Security Symposium
    • Lee, W.1    Stolfo, S.2
  • 11
    • 85075390249 scopus 로고
    • Discovering frequent episodes in sequences
    • AAAI Press, Montreal, Canada, Aug.
    • H. Mannila, H. Toivonen, and A.I. Verkamo, "Discovering frequent episodes in sequences," KDD-95, pp.210-215, AAAI Press, Montreal, Canada, Aug. 1995.
    • (1995) KDD-95 , pp. 210-215
    • Mannila, H.1    Toivonen, H.2    Verkamo, A.I.3
  • 19
    • 0003750241 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • COAST Laboratory, Purdue University, West Lafayette, IN, May
    • J.S. Balesubramaniyan, J.O. Garcia-Fernandes, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," Technical Report 98-05, COAST Laboratory, Purdue University, West Lafayette, IN, May 1998.
    • (1998) Technical Report , vol.98 , Issue.5
    • Balesubramaniyan, J.S.1    Garcia-Fernandes, J.O.2    Isacoff, D.3    Spafford, E.4    Zamboni, D.5
  • 23
    • 0034593106 scopus 로고    scopus 로고
    • Visualization of navigation patterns on a web site using model-based clustering
    • ACM Press
    • I.V. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White, "Visualization of navigation patterns on a web site using model-based clustering," Proc. KDD2000, pp.280-284, ACM Press, 2000.
    • (2000) Proc. KDD2000 , pp. 280-284
    • Cadez, I.V.1    Heckerman, D.2    Meek, C.3    Smyth, P.4    White, S.5
  • 24
    • 0242537441 scopus 로고    scopus 로고
    • Categorization of web pages and user clustering with mixtures of hidden Markov models
    • A. Ypma and T. Heskes, "Categorization of web pages and user clustering with mixtures of hidden Markov models," Proc. 2002 KDD Workshop on Web Mining, pp.31-43, 2002.
    • (2002) Proc. 2002 KDD Workshop on Web Mining , pp. 31-43
    • Ypma, A.1    Heskes, T.2
  • 25
    • 0242456797 scopus 로고    scopus 로고
    • ADMIT: Anomaly-based data mining for intrusions
    • K. Squeira and M. Zaki, "ADMIT: Anomaly-based data mining for intrusions," Proc. KDD2002, pp.386-395, 2002.
    • (2002) Proc. KDD2002 , pp. 386-395
    • Squeira, K.1    Zaki, M.2
  • 26
    • 0035338003 scopus 로고    scopus 로고
    • A new intrusion detection method based on discriminant analysis
    • May
    • M. Asaka, T. Onabuta, T. Inoue, S. Okazawa, and S. Goto, "A new intrusion detection method based on discriminant analysis," IEICE Trans. Inf. & Syst., vol.E84-D, no.5, pp.570-577, May 2001.
    • (2001) IEICE Trans. Inf. & Syst. , vol.E84-D , Issue.5 , pp. 570-577
    • Asaka, M.1    Onabuta, T.2    Inoue, T.3    Okazawa, S.4    Goto, S.5
  • 27
    • 0035673751 scopus 로고    scopus 로고
    • Public infomation server for tracing intruders in the Internet
    • Dec.
    • M. Asaka, T. Onabuta, and S. Goto, "Public infomation server for tracing intruders in the Internet," IEICE Trans. Commun., vol.E84-B, no.12, pp.3104-3112, Dec. 2001.
    • (2001) IEICE Trans. Commun. , vol.E84-B , Issue.12 , pp. 3104-3112
    • Asaka, M.1    Onabuta, T.2    Goto, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.