메뉴 건너뛰기




Volumn , Issue , 2008, Pages 131-140

Multi-level intrusion detection system (ML-IDS)

Author keywords

[No Author keywords available]

Indexed keywords

AUTONOMIC COMPUTING; NETWORK ATTACKS;

EID: 51649087689     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAC.2008.25     Document Type: Conference Paper
Times cited : (49)

References (42)
  • 2
    • 0003892692 scopus 로고
    • USTAT: A Real-Time Intrusion Detection System for UNIX
    • Master Thesis, University of California, Santa Barbara, November
    • K. Ilgun. "USTAT: A Real-Time Intrusion Detection System for UNIX", Master Thesis, University of California, Santa Barbara, November 1992.
    • (1992)
    • Ilgun, K.1
  • 6
    • 0034300835 scopus 로고    scopus 로고
    • Improving intrusion detection performance using keyword selection and neural networks
    • Richard P. Lippmann and Robert K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks", Computer Networks, 2000, 34:597-603.
    • (2000) Computer Networks , vol.34 , pp. 597-603
    • Lippmann, R.P.1    Cunningham, R.K.2
  • 7
    • 0344095523 scopus 로고    scopus 로고
    • Integrating fuzzy logic with data mining methods for intrusion detection
    • Master's thesis, Department of Computer Science, Mississippi State University
    • Jianxiong Luo, "Integrating fuzzy logic with data mining methods for intrusion detection", Master's thesis, Department of Computer Science, Mississippi State University, 1999.
    • (1999)
    • Luo, J.1
  • 9
    • 0013029835 scopus 로고    scopus 로고
    • PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)
    • 00-015, Department of Computer Science, University of Minnesota
    • Ramesh Agarwal and Mahesh V. Joshi, "PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)", Technical Report TR 00-015, Department of Computer Science, University of Minnesota, 2000.
    • (2000) Technical Report TR
    • Agarwal, R.1    Joshi, M.V.2
  • 10
    • 51649084315 scopus 로고    scopus 로고
    • Smoteboost: Improving the prediction of minority class in boosting
    • Technical Report 2002-136, AHPCRC, 2002
    • Aleksander Lazarevic, Nitesh V. Chawla, Lawrence O. Hall, and Kevin W. Bowyer, "Smoteboost: Improving the prediction of minority class in boosting", Technical Report 2002-136, AHPCRC, 2002
    • Lazarevic, A.1    Chawla, N.V.2    Hall, L.O.3    Bowyer, K.W.4
  • 12
    • 51649085353 scopus 로고    scopus 로고
    • Evaluating boosting algorithms to classify rare classes: Comparison and improvements
    • San Jose, CA
    • Mahesh V. Joshi, Vipin Kumar, and Ramesh C. Agarwal, "Evaluating boosting algorithms to classify rare classes: Comparison and improvements", In ICDM, pages 257-264, San Jose, CA, 2001
    • (2001) ICDM , pp. 257-264
    • Joshi, M.V.1    Kumar, V.2    Agarwal, R.C.3
  • 15
    • 0004118981 scopus 로고
    • The nides statistical component: Description and justification
    • Technical report, Computer Science Laboratory, SRI International
    • Harold S. Javitz and Alfonso Valdes, "The nides statistical component: Description and justification". Technical report, Computer Science Laboratory, SRI International, 1993.
    • (1993)
    • Javitz, H.S.1    Valdes, A.2
  • 17
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system NIDES
    • Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International
    • D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system NIDES", Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, 1995.
    • (1995)
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 20
    • 0003201842 scopus 로고    scopus 로고
    • A Markov Chain Model of Temporal Behavior for Anomaly Detection
    • Man, and Cybernetics
    • N. Ye, "A Markov Chain Model of Temporal Behavior for Anomaly Detection", Proceedings of the 2000 IEEE Systems, Man, and Cybernetics.
    • Proceedings of the 2000 IEEE Systems
    • Ye, N.1
  • 23
    • 0034832620 scopus 로고    scopus 로고
    • Outlier detection for high dimensional data
    • Charu C. Aggarwal and Philip S. Yu, "Outlier detection for high dimensional data". In SIGMOD Conference, 2001.
    • (2001) SIGMOD Conference
    • Aggarwal, C.C.1    Yu, P.S.2
  • 25
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • 18 Sep
    • Shon, T. and Moon, J., "A hybrid machine learning approach to network anomaly detection" Inf. Sci. 177, 18 Sep. 2007, 3799-3821.
    • (2007) Inf. Sci , vol.177 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 26
    • 27644496932 scopus 로고    scopus 로고
    • A new dependency and correlation analysis for features
    • G. Qu, S. Hariri, and M. S. Yousif, "A new dependency and correlation analysis for features." IEEE Trans. Knowl. Data Eng., vol. 17, no. 9, 2005 pp. 1199-1207.
    • (2005) IEEE Trans. Knowl. Data Eng , vol.17 , Issue.9 , pp. 1199-1207
    • Qu, G.1    Hariri, S.2    Yousif, M.S.3
  • 30
    • 51649083528 scopus 로고    scopus 로고
    • RFC793, Transmission control protocol, September 1981. DARPA Internet Program Protocol Specification.
    • RFC793, "Transmission control protocol", September 1981. DARPA Internet Program Protocol Specification.
  • 33
    • 84924223669 scopus 로고    scopus 로고
    • Static Analysis of Executables to Detect Malicious Patterns
    • Washington, D.C
    • Christodorescu, M. and S. Jha. "Static Analysis of Executables to Detect Malicious Patterns", In USENIX Security Symposium, Washington, D.C. 2003.
    • (2003) USENIX Security Symposium
    • Christodorescu, M.1    Jha, S.2
  • 34
    • 33746454721 scopus 로고    scopus 로고
    • Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection
    • Melbourne, FL
    • Vargiya, R. and P. Chan., "Boundary Detection in Tokenizing Network Application Payload for Anomaly Detection", in ICDM Workshop on Data Mining for Computer Security (DMSEC), Melbourne, FL, 2003.
    • (2003) ICDM Workshop on Data Mining for Computer Security (DMSEC)
    • Vargiya, R.1    Chan, P.2
  • 35
    • 0014814325 scopus 로고
    • Space/time trade-offs in Hash Coding with Allowable Errors
    • Bloom, B.H., "Space/time trade-offs in Hash Coding with Allowable Errors", Communications of the ACM, 1970. 13(7): p. 422-426.
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 36
    • 51649110692 scopus 로고    scopus 로고
    • IOS Firewall and Microsoft Windows Vista TCP Window Scaling, Document ID:71613, 2006-2007 Cisco Systems, Inc.
    • IOS Firewall and Microsoft Windows Vista TCP Window Scaling, Document ID:71613, 2006-2007 Cisco Systems, Inc.
  • 37
    • 51649122513 scopus 로고    scopus 로고
    • Network connectivity may fail when you try to use Windows Vista behind a firewall device, Article 1D:93443O, Sept. 26, 2007. Microsoft Corp.
    • Network connectivity may fail when you try to use Windows Vista behind a firewall device, Article 1D:93443O, Sept. 26, 2007. Microsoft Corp.
  • 40
    • 51649098173 scopus 로고    scopus 로고
    • W. W. Cohen. Fast effective rule induction, In Proceedings of the Twelfth International Conference on Machine Learning, Lake Tahoe, California, 1995
    • W. W. Cohen. "Fast effective rule induction", In Proceedings of the Twelfth International Conference on Machine Learning, Lake Tahoe, California, 1995
  • 41
    • 51649110436 scopus 로고    scopus 로고
    • Arash Partow, http://www.partow.net/programming/hashfunctions/ #AvailableHashFunctions
    • Arash Partow, http://www.partow.net/programming/hashfunctions/ #AvailableHashFunctions


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.