메뉴 건너뛰기




Volumn , Issue , 2008, Pages 81-95

Casting out demons: Sanitizing training data for anomaly sensors

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS EVENTS; ANOMALY DETECTIONS; COLLABORATIVE APPROACH; GROUND TRUTH; HIGH-QUALITY; MICRO-MODELS; MULTIPLE MODELING; REALISTIC DATA; SANITIZATION; SANITIZATION PROCESSES; SECURITY AND PRIVACY; SINGLE SITES; TRAINING DATA; TRAINING PHASE; VOTING SCHEMES;

EID: 50249170401     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2008.11     Document Type: Conference Paper
Times cited : (229)

References (31)
  • 2
    • 0030211964 scopus 로고    scopus 로고
    • Bagging Predictors
    • L. Breiman. Bagging Predictors. Machine Learning, 24(2):123-140, 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 8
    • 0344324689 scopus 로고    scopus 로고
    • Metacost: A general method for making classifiers cost-sensitive
    • P. Domingos. Metacost: A general method for making classifiers cost-sensitive. In Knowledge Discovery and Data Mining, pages 155-164, 1999.
    • (1999) Knowledge Discovery and Data Mining , pp. 155-164
    • Domingos, P.1
  • 11
    • 84983110889 scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. In European Conference on Computational Learning Theory, pages 23-37, 1995.
    • (1995) European Conference on Computational Learning Theory , pp. 23-37
    • Freund, Y.1    Schapire, R.E.2
  • 13
    • 0036038437 scopus 로고    scopus 로고
    • Service Specific Anomaly Detection for Network Intrusion Detection
    • Madrid, Spain
    • C. Kruegel, T. Toth, and E. Kirda. Service Specific Anomaly Detection for Network Intrusion Detection. In Symposium on Applied Computing (SAC), Madrid, Spain, 2002.
    • (2002) Symposium on Applied Computing (SAC)
    • Kruegel, C.1    Toth, T.2    Kirda, E.3
  • 15
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
    • J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM TISSEC, 3(4):262-291, 2000.
    • (2000) ACM TISSEC , vol.3 , Issue.4 , pp. 262-291
    • McHugh, J.1
  • 17
    • 27544498978 scopus 로고    scopus 로고
    • Polygraph: Automatically Generating Signatures for Polymorphic Worms
    • Oakland, CA
    • J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Security and Privacy, Oakland, CA, 2005.
    • (2005) IEEE Security and Privacy
    • Newsome, J.1    Karp, B.2    Song, D.3
  • 19
    • 50249154097 scopus 로고    scopus 로고
    • B. Parmanto, M. P. W., and H. R. Doyle. Improving Committee Diagnosis with Resampling Techniques. Advances in Neural Information Processing Systems, 8:882-888, 1996.
    • B. Parmanto, M. P. W., and H. R. Doyle. Improving Committee Diagnosis with Resampling Techniques. Advances in Neural Information Processing Systems, 8:882-888, 1996.
  • 25
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector
    • May
    • K. M. Tan and R. A. Maxion. Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector. In Proceedings of the IEEE Symposium on Security and Privacy, pages 188-201, May 2002.
    • (2002) Proceedings of the IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.M.1    Maxion, R.A.2
  • 27
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry Attacks on Host-Based Intrusion Detection Systems
    • D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. In ACM CCS, 2002.
    • (2002) ACM CCS
    • Wagner, D.1    Soto, P.2
  • 31
    • 0026692226 scopus 로고
    • Stacked Generalization
    • D. Wolpert. Stacked Generalization. In Neural Networks, volume 5, pages 241-259, 1992.
    • (1992) Neural Networks , vol.5 , pp. 241-259
    • Wolpert, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.