메뉴 건너뛰기




Volumn , Issue , 2008, Pages 105-110

On detecting port scanning using fuzzy based intrusion detection system

Author keywords

Fuzzy logic; Intrusion detection system; Port scanning; Snort

Indexed keywords

ALARM SYSTEMS; COMPUTER CRIME; FUZZY INFERENCE; FUZZY LOGIC; FUZZY SETS; FUZZY SYSTEMS; INTERNET; MOBILE COMPUTING; PORTS AND HARBORS; SCANNING; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; TELECOMMUNICATION; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 52949119607     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2008.19     Document Type: Conference Paper
Times cited : (26)

References (16)
  • 2
    • 0023294428 scopus 로고    scopus 로고
    • D. E. Denning, \An intrusion-detection model, IEEE Trans. Softw. Eng., 13, no. 2, pp. 222{232,1987.
    • D. E. Denning, \An intrusion-detection model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222{232,1987.
  • 3
    • 33745463455 scopus 로고    scopus 로고
    • Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation
    • United States Military Academy, West Point, NY
    • Dae-Ki Kang, "Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation", Proceedings of the 6th IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY,2005.
    • (2005) Proceedings of the 6th IEEE Workshop on Information Assurance and Security
    • Kang, D.-K.1
  • 4
    • 52949140770 scopus 로고    scopus 로고
    • http://www.snort.org
  • 5
    • 34248666540 scopus 로고    scopus 로고
    • ZADEH, L. A. Fuzzy sets. Information and Control 8, 3 (1965), 338.353. 118.
    • ZADEH, L. A. Fuzzy sets. Information and Control 8, 3 (1965), 338.353. 118.
  • 6
    • 49949129142 scopus 로고
    • Information and Control
    • ZADEH, L. A. Fuzzy algorithms. Information and Control 12, 2 (1968), 94.102.
    • (1968) Fuzzy algorithms , vol.12 , Issue.94 .102 , pp. 2
    • ZADEH, L.A.1
  • 7
    • 52949084920 scopus 로고    scopus 로고
    • ZADEH, L. A. Fuzzy logic and its application to approximate reasoning. IFIP Congress (1974), 591.594.
    • ZADEH, L. A. Fuzzy logic and its application to approximate reasoning. IFIP Congress (1974), 591.594.
  • 8
    • 0003907293 scopus 로고    scopus 로고
    • Macmillan Technical Publishing, Indianapolis, USA
    • R.G. Bace, Intrusion Detection, Macmillan Technical Publishing, Indianapolis, USA, 2000.
    • (2000) Intrusion Detection
    • Bace, R.G.1
  • 9
    • 27544469503 scopus 로고    scopus 로고
    • A study on fuzzy intrusion detection
    • Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, Orlando, March 28-29, 2005, B. Dasarathy Ed
    • J.T. Yao, S.L. Zhao, L.V. Saxton, (2005), "A study on fuzzy intrusion detection", In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (Orlando, March 28-29, 2005), B. Dasarathy (Ed.), Proceedings of the International Society for Optical Engineering, Volume 5812, pages 23-30.
    • (2005) Proceedings of the International Society for Optical Engineering , vol.5812 , pp. 23-30
    • Yao, J.T.1    Zhao, S.L.2    Saxton, L.V.3
  • 10
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly Intrusion Detection Method Based on HMM
    • Y. Qiao, X.W. Xin, Y. Bin and S. Ge, Anomaly Intrusion Detection Method Based on HMM, Electronics Letters, 38(13), 663-664, 2002.
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 663-664
    • Qiao, Y.1    Xin, X.W.2    Bin, Y.3    Ge, S.4
  • 11
    • 85084163349 scopus 로고    scopus 로고
    • Data Mining Approaches for Intrusion Detection
    • W. Lee and S.J. Stolfo, Data Mining Approaches for Intrusion Detection, 7th USENIX Security Symposium, 1998, pp. 79-94.
    • (1998) 7th USENIX Security Symposium , pp. 79-94
    • Lee, W.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.