메뉴 건너뛰기




Volumn 31, Issue 17, 2008, Pages 4018-4025

A lightweight web server anomaly detection method based on transductive scheme and genetic algorithms

Author keywords

Genetic algorithm; Network security; TCM KNN algorithm; Web server anomaly detection

Indexed keywords

AD HOC NETWORKS; ALGORITHMS; BOOLEAN FUNCTIONS; DIESEL ENGINES; GENETIC ALGORITHMS; INTERNET; NETWORK PROTOCOLS; PUBLIC WORKS; SENSOR NETWORKS; SIGNAL DETECTION; WEB SERVICES; WORLD WIDE WEB;

EID: 55049131898     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.08.009     Document Type: Article
Times cited : (29)

References (25)
  • 2
    • 0037174204 scopus 로고    scopus 로고
    • Prediction algorithms and confidence measure based on algorithmic randomness theory
    • Gammerman A., and Vovk V. Prediction algorithms and confidence measure based on algorithmic randomness theory. Theoretical Computer Science (2002) 209-217
    • (2002) Theoretical Computer Science , pp. 209-217
    • Gammerman, A.1    Vovk, V.2
  • 4
    • 52149120844 scopus 로고    scopus 로고
    • K. Proedru, I. Nouretdinov, V. Vovk, A. Gammerman, Transductive confidence machine for pattern recognition, in: Proc. 13th European Conference on Machine Learning, 2002, pp. 381-390.
    • K. Proedru, I. Nouretdinov, V. Vovk, A. Gammerman, Transductive confidence machine for pattern recognition, in: Proc. 13th European Conference on Machine Learning, 2002, pp. 381-390.
  • 5
    • 33749568055 scopus 로고    scopus 로고
    • B. Daniel, D. Carlotta, P.R. James, Detecting outliers using transduction and statistical testing, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, USA, 2006, pp. 55-64.
    • B. Daniel, D. Carlotta, P.R. James, Detecting outliers using transduction and statistical testing, in: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, USA, 2006, pp. 55-64.
  • 6
    • 34548651677 scopus 로고    scopus 로고
    • Y. Li, B.X. Fang, L. Guo, Y. Chen, Network anomaly detection based on TCM-KNN algorithm, in: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 2007), ACM, 2007, pp. 13-19.
    • Y. Li, B.X. Fang, L. Guo, Y. Chen, Network anomaly detection based on TCM-KNN algorithm, in: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 2007), ACM, 2007, pp. 13-19.
  • 7
    • 34547470656 scopus 로고    scopus 로고
    • J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussian, S. Schwab, C. Ko, Measuring Denial of Service, QoP'06, ACM, 2006, pp. 53-58.
    • J. Mirkovic, P. Reiher, S. Fahmy, R. Thomas, A. Hussian, S. Schwab, C. Ko, Measuring Denial of Service, QoP'06, ACM, 2006, pp. 53-58.
  • 8
    • 55049095581 scopus 로고    scopus 로고
    • J. Ash, M. Dolly, C. Dvorak, A. Morton, P. Taraporte, Y.E. Mghazli, Y.1541-QOSM - Y.1541 QoS Model for Networks Using Y.1541 QoS Classes, NSIS Working Group, Internet Draft, May 2006 (Work in progress).
    • J. Ash, M. Dolly, C. Dvorak, A. Morton, P. Taraporte, Y.E. Mghazli, Y.1541-QOSM - Y.1541 QoS Model for Networks Using Y.1541 QoS Classes, NSIS Working Group, Internet Draft, May 2006 (Work in progress).
  • 9
    • 77954449451 scopus 로고    scopus 로고
    • T. Beigbeder, R. Coughlan, C. Lusher, J. Plunkett, E. Agu, M. Claypool, The effects of loss and latency on user performance in unreal tournament 2003, in: Proceedings of ACM Network and System Support for Games Workshop (NetGames), September 2004.
    • T. Beigbeder, R. Coughlan, C. Lusher, J. Plunkett, E. Agu, M. Claypool, The effects of loss and latency on user performance in unreal tournament 2003, in: Proceedings of ACM Network and System Support for Games Workshop (NetGames), September 2004.
  • 10
    • 55049130515 scopus 로고    scopus 로고
    • Laetitia Jourdan, Clarisse Dhaenens, El-Ghazali Talbi, A Genetic algorithm for feature selection in data-mining for genetics, in: Proceedings of the 4th Metaheuristics International Conference, 2001, pp. 29-33.
    • Laetitia Jourdan, Clarisse Dhaenens, El-Ghazali Talbi, A Genetic algorithm for feature selection in data-mining for genetics, in: Proceedings of the 4th Metaheuristics International Conference, 2001, pp. 29-33.
  • 11
    • 0347763609 scopus 로고    scopus 로고
    • Jose Ramon Cano, Francisco Herrera, Manuel Lozano, Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study, IEEE Transactions on Evolutionary Computation, 2006, pp. 561-575.
    • Jose Ramon Cano, Francisco Herrera, Manuel Lozano, Using evolutionary algorithms as instance selection for data reduction in KDD: an experimental study, IEEE Transactions on Evolutionary Computation, 2006, pp. 561-575.
  • 12
    • 85084163349 scopus 로고    scopus 로고
    • W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 1998 USENIX Security Symposium, 1998.
    • W. Lee, S.J. Stolfo, Data mining approaches for intrusion detection, in: Proceedings of the 1998 USENIX Security Symposium, 1998.
  • 13
    • 85084160308 scopus 로고    scopus 로고
    • A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the 8th USENIX Security Symposium, 1999.
    • A. Ghosh, A. Schwartzbard, A study in using neural networks for anomaly and misuse detection, in: Proceedings of the 8th USENIX Security Symposium, 1999.
  • 14
    • 0242456801 scopus 로고    scopus 로고
    • M. Mahoney, P. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceeding of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 376-385.
    • M. Mahoney, P. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in: Proceeding of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 376-385.
  • 16
    • 0036343692 scopus 로고    scopus 로고
    • Haining Wang et al., Detecting SYN flooding attacks, in: IEEE Infocom'2002, pp. 1530-1539.
    • Haining Wang et al., Detecting SYN flooding attacks, in: IEEE Infocom'2002, pp. 1530-1539.
  • 17
    • 55049118146 scopus 로고    scopus 로고
    • T. Peng et al., Protection from distributed denial of service attack using history-based ip filtering, in: IEEE ICC 2003.
    • T. Peng et al., Protection from distributed denial of service attack using history-based ip filtering, in: IEEE ICC 2003.
  • 18
    • 55049142498 scopus 로고    scopus 로고
    • D. Dittrich, The stacheldraht distributed denial of service attack tool. Available from: .
    • D. Dittrich, The stacheldraht distributed denial of service attack tool. Available from: .
  • 19
    • 55049108644 scopus 로고    scopus 로고
    • J. Barlow, W. Thrower, TFN2K - an analysis. Available from: .
    • J. Barlow, W. Thrower, TFN2K - an analysis. Available from: .
  • 20
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-counter filtering
    • Wang H., Jin C., and Shin K.G. Defense against spoofed IP traffic using hop-counter filtering. IEEE/ACM Transactions on Networking 15 1 (2007) 40-53
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 21
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Yau D., Lui J., Liang F., and Yang Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking 13 1 (2005) 29-42
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.1 , pp. 29-42
    • Yau, D.1    Lui, J.2    Liang, F.3    Yang, Y.4
  • 22
    • 55049119508 scopus 로고    scopus 로고
    • W. Li, Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, 2002, pp. 1-8.
    • W. Li, Using genetic algorithm for network intrusion detection, C.S.G. Department of Energy, 2002, pp. 1-8.
  • 24
    • 55049109545 scopus 로고    scopus 로고
    • F. Pernkopf, P.O. Leary, A Genetic algorithm for feature selection in data-mining for genetics, in: Proc. of 4th Metaheuristics International Conference, 2001, pp. 29-33.
    • F. Pernkopf, P.O. Leary, A Genetic algorithm for feature selection in data-mining for genetics, in: Proc. of 4th Metaheuristics International Conference, 2001, pp. 29-33.
  • 25
    • 36549085110 scopus 로고    scopus 로고
    • An active learning based TCM-KNN algorithm for supervised network intrusion detection
    • Li Y., and Guo L. An active learning based TCM-KNN algorithm for supervised network intrusion detection. Computers & Security 26 7-8 (2007) 459-467
    • (2007) Computers & Security , vol.26 , Issue.7-8 , pp. 459-467
    • Li, Y.1    Guo, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.