메뉴 건너뛰기




Volumn 52, Issue 14, 2008, Pages 2745-2763

REFACING: An autonomic approach to network security based on multidimensional trustworthiness

Author keywords

Autonomic communication; Dempster; Information fusion; Network security; Shafer theory; Trustworthiness

Indexed keywords

DATA FUSION; FUSION REACTIONS; INFORMATION FUSION; INTERNET; INTRUSION DETECTION; NETWORK SECURITY; NUCLEAR PHYSICS; RELIABILITY; SENSOR NETWORKS;

EID: 49949086459     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2008.04.022     Document Type: Article
Times cited : (15)

References (20)
  • 1
    • 49849130570 scopus 로고    scopus 로고
    • Jean Gordon, E. Edward, H. Shortliffe, Rule-Based Expert Systems, Chapter The Dempster-Shafer Theory of Evidence.
    • Jean Gordon, E. Edward, H. Shortliffe, Rule-Based Expert Systems, Chapter The Dempster-Shafer Theory of Evidence.
  • 3
    • 68949175922 scopus 로고    scopus 로고
    • Nong Ye, Mingning Xu, Information fusion for intrusion detection, in: Third International Conference on Information Fusion, vol. 2, July 2000, pp. 17-20.
    • Nong Ye, Mingning Xu, Information fusion for intrusion detection, in: Third International Conference on Information Fusion, vol. 2, July 2000, pp. 17-20.
  • 4
    • 84867339043 scopus 로고    scopus 로고
    • F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, in: Proceedings of the IEEE Symposium on Security and Privacy, 2002, pp. 202-215.
    • F. Cuppens, A. Miege, Alert correlation in a cooperative intrusion detection framework, in: Proceedings of the IEEE Symposium on Security and Privacy, 2002, pp. 202-215.
  • 5
    • 49949102369 scopus 로고    scopus 로고
    • Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner, State of the practice of intrusion detection technologies, 1999.
    • Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, Ed Stoner, State of the practice of intrusion detection technologies, 1999.
  • 6
    • 49949084147 scopus 로고    scopus 로고
    • James P. Anderson, Computer security threat monitoring and surveillance, Fort Washington, Pennsylvania, April 1980.
    • James P. Anderson, Computer security threat monitoring and surveillance, Fort Washington, Pennsylvania, April 1980.
  • 7
    • 0036088611 scopus 로고    scopus 로고
    • Daniel J. Burroughs, Linda F. Wilson, George V. Cybenko, Analysis of distributed intrusion detection systems using bayesian methods, in: International Performance Computing and Communication Conference, April 2002.
    • Daniel J. Burroughs, Linda F. Wilson, George V. Cybenko, Analysis of distributed intrusion detection systems using bayesian methods, in: International Performance Computing and Communication Conference, April 2002.
  • 8
    • 1642434224 scopus 로고    scopus 로고
    • Vincent Berk, Robert Gray, George Bakos, Using sensor networks and data fusion for early detection of active worms, in: SPIE Aerosense Conference, vol. 5071, April 2003, pp. 92-104.
    • Vincent Berk, Robert Gray, George Bakos, Using sensor networks and data fusion for early detection of active worms, in: SPIE Aerosense Conference, vol. 5071, April 2003, pp. 92-104.
  • 9
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • ACM Press, NY, USA pp. 99-105, April
    • Bass T. Intrusion detection systems and multisensor data fusion. Communications of the ACM 43 (2000), ACM Press, NY, USA pp. 99-105, April
    • (2000) Communications of the ACM , vol.43
    • Bass, T.1
  • 10
    • 0036828078 scopus 로고    scopus 로고
    • Using Dempster-Shafer's theory of evidence to combine aspects of information use
    • Ruthven I., and Lalmas M. Using Dempster-Shafer's theory of evidence to combine aspects of information use. J. Int. Inf. Syst. 19 3 (2002) 267-301
    • (2002) J. Int. Inf. Syst. , vol.19 , Issue.3 , pp. 267-301
    • Ruthven, I.1    Lalmas, M.2
  • 11
    • 49949084518 scopus 로고    scopus 로고
    • D. Yu, D. Frincke, Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory, in: Proceedings of the 43rd annual southeast regional conference, ACM Press, New York, NY, USA, March 2005, pp. 142-147.
    • D. Yu, D. Frincke, Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory, in: Proceedings of the 43rd annual southeast regional conference, ACM Press, New York, NY, USA, March 2005, pp. 142-147.
  • 12
    • 0036051055 scopus 로고    scopus 로고
    • H. Wu, M. Siegel, R. Stiefelhagen, J. Yang, Sensor fusion using Dempster-Shafer theory, in: Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, 2002.
    • H. Wu, M. Siegel, R. Stiefelhagen, J. Yang, Sensor fusion using Dempster-Shafer theory, in: Proceedings of IEEE Instrumentation and Measurement Technology Conference, Anchorage, AK, USA, 2002.
  • 13
    • 0037253062 scopus 로고    scopus 로고
    • The vision of autonomic computing
    • Kephart J.O., and Chess D.M. The vision of autonomic computing. Computer 36 1 (2003) 41-50
    • (2003) Computer , vol.36 , Issue.1 , pp. 41-50
    • Kephart, J.O.1    Chess, D.M.2
  • 14
    • 49949101591 scopus 로고    scopus 로고
    • A. Garg, R. Battiti, R. Cascella, Reputation Management: Experiments on the Robustness of ROCQ, Technical Report DIT-05-087.
    • A. Garg, R. Battiti, R. Cascella, Reputation Management: Experiments on the Robustness of ROCQ, Technical Report DIT-05-087.
  • 16
    • 33644696610 scopus 로고    scopus 로고
    • Cooperative defence against ddos attacks
    • Zhang G., and Parashar M. Cooperative defence against ddos attacks. J Res Pract Inf Technol 38 1 (2006) 69-84
    • (2006) J Res Pract Inf Technol , vol.38 , Issue.1 , pp. 69-84
    • Zhang, G.1    Parashar, M.2
  • 17
    • 0242696192 scopus 로고    scopus 로고
    • Sonja Buchegger, Jean-Yves, Le Boudec, Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks), in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, June 2002.
    • Sonja Buchegger, Jean-Yves, Le Boudec, Performance analysis of the confidant protocol (cooperation of nodes: fairness in dynamic ad-hoc networks), in: Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, MobiHOC, June 2002.
  • 18
    • 49949113042 scopus 로고    scopus 로고
    • Pietro Michiardi, Refik Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks, in: Proceedings of Communications and Multimedia Security Conference, CMS, September 2002.
    • Pietro Michiardi, Refik Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks, in: Proceedings of Communications and Multimedia Security Conference, CMS, September 2002.
  • 19
    • 33746071857 scopus 로고    scopus 로고
    • Ensemble methods for noise elimination in classification problems
    • Springer-Verlag
    • Verbaeten S., and Van Assche A. Ensemble methods for noise elimination in classification problems. Lecture Notes in Computer Science vol. 2709 (2003), Springer-Verlag
    • (2003) Lecture Notes in Computer Science , vol.2709
    • Verbaeten, S.1    Van Assche, A.2
  • 20
    • 84944324287 scopus 로고    scopus 로고
    • X. Zeng, T. Martinez. A noise filtering method using neural networks, in: Proceedings of the IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, May 2003, pp. 26-31.
    • X. Zeng, T. Martinez. A noise filtering method using neural networks, in: Proceedings of the IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, May 2003, pp. 26-31.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.