메뉴 건너뛰기




Volumn 5180 LNAI, Issue , 2008, Pages 116-130

Trust-based classifier combination for network anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; SOFTWARE AGENTS;

EID: 57849104685     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85834-8_11     Document Type: Conference Paper
Times cited : (14)

References (31)
  • 1
    • 42449117164 scopus 로고    scopus 로고
    • Guide to intrusion detection and prevention systems (idps)
    • Technical Report 800-94. NIST, US Dept. of Commerce
    • Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (idps). Technical Report 800-94. NIST, US Dept. of Commerce (2007)
    • (2007)
    • Scarfone, K.1    Mell, P.2
  • 2
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13, 222-232 (1987)
    • (1987) IEEE Trans. Softw. Eng , vol.13 , pp. 222-232
    • Denning, D.E.1
  • 3
    • 56449096542 scopus 로고    scopus 로고
    • Cisco Systems: Cisco IOS NetFlow (2007). http://www.cisco.com/go/netflow
    • (2007) Cisco IOS NetFlow
  • 4
  • 7
    • 85006210403 scopus 로고    scopus 로고
    • Review on computational trust and reputation models
    • Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33-60 (2005)
    • (2005) Artif. Intell. Rev , vol.24 , pp. 33-60
    • Sabater, J.1    Sierra, C.2
  • 8
    • 0036367544 scopus 로고    scopus 로고
    • Reputation and social network analysis in multi-agent systems
    • Bologna, Italy, pp
    • Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Proceedings of AAMAS 2002, Bologna, Italy, pp. 475-482 (2002)
    • (2002) Proceedings of AAMAS , pp. 475-482
    • Sabater, J.1    Sierra, C.2
  • 9
    • 9244265500 scopus 로고    scopus 로고
    • Devising a trust model for multi-agent interactions using confidence and reputation
    • Ramchurn. S., Jennings, N., Sierra, C. Godo, L.: Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence 18, 833-852 (2004)
    • (2004) Applied Artificial Intelligence , vol.18 , pp. 833-852
    • Ramchurn, S.1    Jennings, N.2    Sierra, C.3    Godo, L.4
  • 10
    • 85041439566 scopus 로고    scopus 로고
    • Principles of trust for mas: Cognitive anatomy, social importance, and quantification
    • IEEE Computer Society Press, Los Alamitos
    • Castelfranchi, C., Falcone, R.: Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In: Proceedings of the 3rd International Conference on Multi Agent Systems, p. 72. IEEE Computer Society Press, Los Alamitos (1998)
    • (1998) Proceedings of the 3rd International Conference on Multi Agent Systems , pp. 72
    • Castelfranchi, C.1    Falcone, R.2
  • 13
    • 37249032765 scopus 로고    scopus 로고
    • Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), 4676. Springer, Heidelberg (2007)
    • Rehak, M., Pechoucek, M.: Trust modeling with context representation and generalized identities. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), vol. 4676. Springer, Heidelberg (2007)
  • 14
    • 37249002882 scopus 로고    scopus 로고
    • Rettinger, A., Nickles, M., Tresp, V.: Learning initial trust among interacting agents. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), 4670, pp. 313-327. Springer, Heidelberg (2007)
    • Rettinger, A., Nickles, M., Tresp, V.: Learning initial trust among interacting agents. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI), vol. 4670, pp. 313-327. Springer, Heidelberg (2007)
  • 17
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosis Network-Wide Traffic Anomalies
    • ACM Press, New York
    • Lakhina, A., Crovella, M., Diot, C.: Diagnosis Network-Wide Traffic Anomalies. In: ACM STGCOMM 2004, pp. 219-230. ACM Press, New York (2004)
    • (2004) ACM STGCOMM , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 18
    • 33847290520 scopus 로고    scopus 로고
    • Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies using Traffic Feature Distributions. In: ACM SIGCOMM, August 2005, pp. 217-228. ACM Press, New York (2005)
    • Lakhina, A., Crovella, M., Diot, C.: Mining Anomalies using Traffic Feature Distributions. In: ACM SIGCOMM, August 2005, pp. 217-228. ACM Press, New York (2005)
  • 22
    • 84961646665 scopus 로고    scopus 로고
    • Lyon. G.: Nmap, http://insecure.org/nmap/
    • Nmap
    • Lyon, G.1
  • 23
    • 1142293052 scopus 로고    scopus 로고
    • Detecting deception in reputation management
    • ACM Press, New York
    • Yu, B., Singh. M.P.: Detecting deception in reputation management. In: AAMAS 2003. pp. 73-80. ACM Press, New York (2003)
    • (2003) AAMAS , pp. 73-80
    • Yu, B.1    Singh, M.P.2
  • 24
    • 78650361584 scopus 로고    scopus 로고
    • Barber, K.S., Kim, J.: Belief revision process based on trust: Agents evaluating reputation of information sources. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), 2246, pp. 73-82. Springer, Heidelberg (2001)
    • Barber, K.S., Kim, J.: Belief revision process based on trust: Agents evaluating reputation of information sources. In: Falcone, R., Singh, M., Tan, Y.-H. (eds.) AA-WS 2000. LNCS (LNAI), vol. 2246, pp. 73-82. Springer, Heidelberg (2001)
  • 25
    • 37249034250 scopus 로고    scopus 로고
    • Vu, L.-H., Aberer, K.: A probabilistic framework for decentralized management of trust and quality. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI). 4676. pp. 328-342. Springer, Heidelberg (2007)
    • Vu, L.-H., Aberer, K.: A probabilistic framework for decentralized management of trust and quality. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling, L. (eds.) CIA 2007. LNCS (LNAI). vol. 4676. pp. 328-342. Springer, Heidelberg (2007)
  • 28
    • 21944457574 scopus 로고    scopus 로고
    • Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 01. 146-169 (2004)
    • Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R.A.: A comprehensive approach to intrusion detection alert correlation. IEEE Transactions on Dependable and Secure Computing 01. 146-169 (2004)
  • 29
    • 35148882671 scopus 로고    scopus 로고
    • Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems
    • Shyu, M.L., Quirino, T. Xie. Z., Chen, S.C., Chang, L.: Network intrusion detection through adaptive sub-eigenspace modeling in multiagent systems. ACM Trans. Auton. Adapt. Syst. 2, 9 (2007)
    • (2007) ACM Trans. Auton. Adapt. Syst , vol.2 , pp. 9
    • Shyu, M.L.1    Quirino, T.2    Xie, Z.3    Chen, S.C.4    Chang, L.5
  • 31
    • 57849142980 scopus 로고    scopus 로고
    • Rehak, M., Pechoucek. M., Celeda. P., Krmicek, V., Moninec, J. Dymacek, T., Medvigy, D.: High-performance agent system for intrusion detection in backbone networks. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), 4670. Springer, Heidelberg (2007)
    • Rehak, M., Pechoucek. M., Celeda. P., Krmicek, V., Moninec, J. Dymacek, T., Medvigy, D.: High-performance agent system for intrusion detection in backbone networks. In: Klusch, M., Hindriks, K.V., Papazoglou, M.P., Sterling. L. (eds.) CIA 2007. LNCS (LNAI), vol. 4670. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.