메뉴 건너뛰기




Volumn 32, Issue 1, 2009, Pages 31-44

Fast intrusion detection based on a non-negative matrix factorization model

Author keywords

Anomaly detection; Computer security; Intrusion detection system; Non negative matrix factorization

Indexed keywords

BLIND SOURCE SEPARATION; COLUMNS (STRUCTURAL); COMPUTER CRIME; COMPUTER SYSTEMS; FACE RECOGNITION; FACTORIZATION; FEATURE EXTRACTION; LIGHT MEASUREMENT; SECURITY OF DATA; VECTORS;

EID: 55949124178     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2008.04.006     Document Type: Article
Times cited : (43)

References (31)
  • 1
    • 55949129534 scopus 로고    scopus 로고
    • Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): a summary. Technical report SRI-CSL-95-07, Menlo Park, CA: Computer Science Laboratory, SRI International; May 1995.
    • Anderson D, Frivold T, Valdes A. Next-generation intrusion detection expert system (NIDES): a summary. Technical report SRI-CSL-95-07, Menlo Park, CA: Computer Science Laboratory, SRI International; May 1995.
  • 2
    • 0242289557 scopus 로고    scopus 로고
    • A rough set theory based method for anomaly intrusion detection in computer networks
    • Cai Z., Guan X., Shao P., et al. A rough set theory based method for anomaly intrusion detection in computer networks. Expert Syst 18 5 (2003) 251-259
    • (2003) Expert Syst , vol.18 , Issue.5 , pp. 251-259
    • Cai, Z.1    Guan, X.2    Shao, P.3
  • 3
    • 55949088112 scopus 로고    scopus 로고
    • CERT Advisory CA-2001-07 File globbing vulnerabilities in various FTP servers [Online]. Available: 〈http://www.cert.org/advisories/CA-2001-07.html〉.
    • CERT Advisory CA-2001-07 File globbing vulnerabilities in various FTP servers [Online]. Available: 〈http://www.cert.org/advisories/CA-2001-07.html〉.
  • 4
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows using hidden markov model
    • Cho S.B., and Park H.J. Efficient anomaly detection by modeling privilege flows using hidden markov model. Comput Secur 22 1 (2003) 45-55
    • (2003) Comput Secur , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.B.1    Park, H.J.2
  • 5
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning D.E. An intrusion-detection model. IEEE Trans Software Eng 13 2 (1987) 222-232
    • (1987) IEEE Trans Software Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 7
    • 2342576784 scopus 로고    scopus 로고
    • Predicting the intrusion intentions by observing system call sequences
    • Feng L., Guan X., Guo S., et al. Predicting the intrusion intentions by observing system call sequences. Comput Secur 23 5 (2004) 241-252
    • (2004) Comput Secur , vol.23 , Issue.5 , pp. 241-252
    • Feng, L.1    Guan, X.2    Guo, S.3
  • 8
    • 0029716418 scopus 로고    scopus 로고
    • Forrest S, Hofmeyr SA, Somayaji A, et al. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE symposium on research in security and privacy, Los Alamos, CA, 1996, p.120-8.
    • Forrest S, Hofmeyr SA, Somayaji A, et al. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE symposium on research in security and privacy, Los Alamos, CA, 1996, p.120-8.
  • 10
    • 55949109812 scopus 로고    scopus 로고
    • Hu W, Liao Y, Vemuri VR. Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications (ICMLA'03), Los Angeles, California, June 2003.
    • Hu W, Liao Y, Vemuri VR. Robust support vector machines for anomaly detection in computer security. In: Proceedings of the 2003 international conference on machine learning and applications (ICMLA'03), Los Angeles, California, June 2003.
  • 11
    • 55949127239 scopus 로고    scopus 로고
    • Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables. In: Eighth symposium on recent advances in intrusion detection (RAID), 2005.
    • Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables. In: Eighth symposium on recent advances in intrusion detection (RAID), 2005.
  • 12
    • 0032218214 scopus 로고    scopus 로고
    • Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the fifth ACM conference on computer & communication security, 1998.
    • Lane T, Brodley CE. Temporal sequence learning and data reduction for anomaly detection. In: Proceedings of the fifth ACM conference on computer & communication security, 1998.
  • 13
    • 0033592606 scopus 로고    scopus 로고
    • Learning the parts of objects with nonnegative matrix factorization
    • Lee D.D., and Seung H.S. Learning the parts of objects with nonnegative matrix factorization. Nature 401 (1999) 788-791
    • (1999) Nature , vol.401 , pp. 788-791
    • Lee, D.D.1    Seung, H.S.2
  • 15
    • 85084163349 scopus 로고    scopus 로고
    • Lee W, Stolfo S. Data mining approaches for intrusion detection. In: Proceedings of the seventh USENIX security symposium, Usenix Association, January 1998, p. 79-94.
    • Lee W, Stolfo S. Data mining approaches for intrusion detection. In: Proceedings of the seventh USENIX security symposium, Usenix Association, January 1998, p. 79-94.
  • 16
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • Liao Y., and Vemuri V.R. Use of k-nearest neighbor classifier for intrusion detection. Comput Secur 21 5 (2002) 439-448
    • (2002) Comput Secur , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 17
    • 55949103367 scopus 로고    scopus 로고
    • Lunt T, Tamaru A, Gilham F, et al. A real-time intrusion detection expert system (IDES)-final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February, 1992.
    • Lunt T, Tamaru A, Gilham F, et al. A real-time intrusion detection expert system (IDES)-final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February, 1992.
  • 18
    • 0141762461 scopus 로고    scopus 로고
    • Moore D, Shannon C. Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2002 ACM SICGOMM internet measurement workshop, Marseille, France, November 2002, p. 273-84.
    • Moore D, Shannon C. Code-red: a case study on the spread and victims of an internet worm. In: Proceedings of the 2002 ACM SICGOMM internet measurement workshop, Marseille, France, November 2002, p. 273-84.
  • 19
    • 55949100627 scopus 로고    scopus 로고
    • Moore D, et al. The Spread of the Sapphire/Slammer Worm [Online]. Available: 〈http://www.caida.org/analysis/security/sapphire〉, February 2007.
    • Moore D, et al. The Spread of the Sapphire/Slammer Worm [Online]. Available: 〈http://www.caida.org/analysis/security/sapphire〉, February 2007.
  • 20
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Inf Process Lett 76 (2000) 33-38
    • (2000) Inf Process Lett , vol.76 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 21
    • 0012282403 scopus 로고    scopus 로고
    • Computer intrusion: detecting masquerades
    • Schonlau M., Dumouchel W., Ju W.H., et al. Computer intrusion: detecting masquerades. Stat Sci 16 1 (2001) 58-74
    • (2001) Stat Sci , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1    Dumouchel, W.2    Ju, W.H.3
  • 22
    • 0024122965 scopus 로고    scopus 로고
    • Smaha SE. Haystack: an intrusion detection system. In: Proceedings of the IEEE fourth aerospace computer security applications conference, 1988.
    • Smaha SE. Haystack: an intrusion detection system. In: Proceedings of the IEEE fourth aerospace computer security applications conference, 1988.
  • 23
    • 6344239144 scopus 로고    scopus 로고
    • Wang W, Guan X, Zhang X. Modeling program behaviors by hidden markov models for intrusion detection. In: Proceedings of the third international conference on machine learning and cybernetics (ICMLC 2004), 2004, p. 2830-5.
    • Wang W, Guan X, Zhang X. Modeling program behaviors by hidden markov models for intrusion detection. In: Proceedings of the third international conference on machine learning and cybernetics (ICMLC 2004), 2004, p. 2830-5.
  • 24
    • 21144450811 scopus 로고    scopus 로고
    • Wang W, Guan X, Zhang X. A novel intrusion detection method based on principal component analysis in computer security. Advances in neural networks-ISNN 2004. In: International IEEE symposium on neural networks, Dalian, China. Lecture notes in computer science (LNCS), no. 3174. 2004, p. 657-62.
    • Wang W, Guan X, Zhang X. A novel intrusion detection method based on principal component analysis in computer security. Advances in neural networks-ISNN 2004. In: International IEEE symposium on neural networks, Dalian, China. Lecture notes in computer science (LNCS), no. 3174. 2004, p. 657-62.
  • 25
    • 85128537938 scopus 로고    scopus 로고
    • Wang W, Guan X, Zhang X. Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: Proceedings of 43rd IEEE conference on decision and control (CDC'04), Atlantis, Paradise Island, Bahamas, December 2004, p. 99-104.
    • Wang W, Guan X, Zhang X. Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: Proceedings of 43rd IEEE conference on decision and control (CDC'04), Atlantis, Paradise Island, Bahamas, December 2004, p. 99-104.
  • 26
    • 33750333036 scopus 로고    scopus 로고
    • Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
    • Wang W., Guan X., Zhang X., and Yang L. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Comput Secur Elsevier 25 7 (2006) 539-550
    • (2006) Comput Secur Elsevier , vol.25 , Issue.7 , pp. 539-550
    • Wang, W.1    Guan, X.2    Zhang, X.3    Yang, L.4
  • 27
    • 37049002837 scopus 로고    scopus 로고
    • Processing of massive audit data streams for real-time anomaly intrusion detection
    • Wang W., Guan X., and Zhang X. Processing of massive audit data streams for real-time anomaly intrusion detection. Comput Commun Elsevier 31 1 (2008) 58-72
    • (2008) Comput Commun Elsevier , vol.31 , Issue.1 , pp. 58-72
    • Wang, W.1    Guan, X.2    Zhang, X.3
  • 28
    • 84880174811 scopus 로고    scopus 로고
    • Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE symposium on security and privacy, 1999, p. 133-45.
    • Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE symposium on security and privacy, 1999, p. 133-45.
  • 29
    • 55949121187 scopus 로고    scopus 로고
    • Wespi A, Dacier M, Debar H. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the third international workshop on the recent advances in intrusion detection (RAID'2000), no. 1907, Lecture notes on computer scinece, October 2000.
    • Wespi A, Dacier M, Debar H. Intrusion detection using variable-length audit trail patterns. In: Proceedings of the third international workshop on the recent advances in intrusion detection (RAID'2000), no. 1907, Lecture notes on computer scinece, October 2000.
  • 30
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • Yeung D.Y., and Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 1 (2003) 229-243
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 31
    • 0038349210 scopus 로고    scopus 로고
    • Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis. In: Proceedings ninth ACM conference on computer and communication security, November 2002.
    • Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis. In: Proceedings ninth ACM conference on computer and communication security, November 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.