메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

Network anomaly detection based on wavelet analysis

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; INTERNET SERVICE PROVIDERS; INTRUSION DETECTION; PROGRAMMING THEORY;

EID: 59949095579     PISSN: 16876172     EISSN: 16876180     Source Type: Journal    
DOI: 10.1155/2009/837601     Document Type: Article
Times cited : (187)

References (50)
  • 3
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S., The base-rate fallacy and the difficulty of intrusion detection ACM Transactions on Information and System Security 2000 3 3 186 201
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-201
    • Axelsson, S.1
  • 6
    • 0024122965 scopus 로고    scopus 로고
    • Proceedings of the 4th IEEE Aerospace Computer Security Applications Conference December 1988 Orlando, Fla, USA
    • Smaha S. E., Haystack: an intrusion detection system Proceedings of the 4th IEEE Aerospace Computer Security Applications Conference December 1988 Orlando, Fla, USA 37 44
    • Haystack: An intrusion detection system , pp. 37-44
    • Smaha, S.E.1
  • 9
    • 33845989821 scopus 로고    scopus 로고
    • Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06) March 2006 Taipei, Taiwan
    • Barreno M., Nelson B., Sears R., Joseph A. D., Tygar J. D., Can machine learning be secure? Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 06) March 2006 Taipei, Taiwan 16 25
    • Can machine learning be secure? , pp. 16-25
    • Barreno, M.1    Nelson, B.2    Sears, R.3    Joseph, A.D.4    Tygar, J.D.5
  • 10
    • 49649112245 scopus 로고    scopus 로고
    • Analysis of a computer security dataset: Why machine learning algorithms fail on KDD dataset for misuse detection
    • Sabhnani M., Serpen G., Analysis of a computer security dataset: why machine learning algorithms fail on KDD dataset for misuse detection Intelligent Data Analysis 2004 8 4 403 415
    • (2004) Intelligent Data Analysis , vol.8 , Issue.4 , pp. 403-415
    • Sabhnani, M.1    Serpen, G.2
  • 11
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha A., Park J.-M., An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 2007 51 12 3448 3470
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 12
    • 0036343692 scopus 로고    scopus 로고
    • Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 02) June 2002 New York, NY, USA
    • Wang H., Zhang D., Shin K. G., Detecting SYN flooding attacks 3 Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 02) June 2002 New York, NY, USA 1530 1539
    • Detecting SYN flooding attacks , vol.3 , pp. 1530-1539
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 13
    • 0141427794 scopus 로고    scopus 로고
    • Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW 02) November 2002 Marseille, France
    • Barford P., Kline J., Plonka D., Ron A., A signal analysis of network traffic anomalies Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment (IMW 02) November 2002 Marseille, France 71 82
    • A signal analysis of network traffic anomalies , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 15
    • 59949087663 scopus 로고    scopus 로고
    • Proceedings of Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks August 2006 Baltimore, Md, USA
    • Huang C.-T., Thareja S., Shin Y.-J., Wavelet-based real time detection of network traffic anomalies Proceedings of Workshop on Enterprise Network Security and the 2nd International Conference on Security and Privacy in Communication Networks August 2006 Baltimore, Md, USA 1 7
    • Wavelet-based real time detection of network traffic anomalies , pp. 1-7
    • Huang, C.-T.1    Thareja, S.2    Shin, Y.-J.3
  • 16
    • 33749819450 scopus 로고    scopus 로고
    • Image-based anomaly detection technique: Algorithm, implementation and effectiveness
    • Kim S. S., Reddy A. L. N., Image-based anomaly detection technique: algorithm, implementation and effectiveness IEEE Journal on Selected Areas in Communications 2006 24 10 1942 1954
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.10 , pp. 1942-1954
    • Kim, S.S.1    Reddy, A.L.N.2
  • 19
    • 84952326439 scopus 로고    scopus 로고
    • Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03) October 2003 Dallas, Tex, USA
    • Li L., Lee G., DDoS attack detection and wavelets Proceedings of 12th International Conference on Computer Communications and Networks (ICCCN 03) October 2003 Dallas, Tex, USA 421 427
    • DDoS attack detection and wavelets , pp. 421-427
    • Li, L.1    Lee, G.2
  • 20
    • 50949130514 scopus 로고    scopus 로고
    • Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 06) November 2006 San Francisco, Calif, USA
    • Dainotti A., Pescape A., Ventre G., Wavelet-based detection of DoS attacks Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 06) November 2006 San Francisco, Calif, USA 1 6
    • Wavelet-based detection of DoS attacks , pp. 1-6
    • Dainotti, A.1    Pescape, A.2    Ventre, G.3
  • 22
    • 21844451952 scopus 로고    scopus 로고
    • Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04) September 2004 Portland, Ore, USA
    • Lakhina A., Crovella M., Diot C., Diagnosing network-wide traffic anomalies Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04) September 2004 Portland, Ore, USA 219 230
    • Diagnosing network-wide traffic anomalies , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 26
    • 34548613852 scopus 로고    scopus 로고
    • Proceedings of the 7th International Conference on Information Technology (CIT 04) December 2004 Hyderabad, India Lecture Notes in Computer Science
    • Rawat S., Sastry C. S., Network intrusion detection using wavelet analysis 3356 Proceedings of the 7th International Conference on Information Technology (CIT 04) December 2004 Hyderabad, India 224 232 Lecture Notes in Computer Science
    • Network intrusion detection using wavelet analysis , vol.3356 , pp. 224-232
    • Rawat, S.1    Sastry, C.S.2
  • 27
    • 0000293183 scopus 로고
    • Theory of communication
    • Gabor D., Theory of communication Journal of IEE 1946 93 429 441
    • (1946) Journal of IEE , vol.93 , pp. 429-441
    • Gabor, D.1
  • 28
    • 59949097314 scopus 로고    scopus 로고
    • http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • KDDCUP,. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • Kddcup1
  • 29
    • 59949101916 scopus 로고    scopus 로고
    • 1999, http://www.ll.mit.edu/IST/ideval/data/1999/1999dataindex.html
    • DARPA,. 1999, http://www.ll.mit.edu/IST/ideval/data/1999/1999dataindex. html
    • Darpa1
  • 30
    • 59949092401 scopus 로고    scopus 로고
    • 1998, http://www.ll.mit.edu/IST/ideval/data/1998/1998dataindex.html
    • DARPA,. 1998, http://www.ll.mit.edu/IST/ideval/data/1998/1998dataindex. html
    • Darpa1
  • 38
    • 59949085318 scopus 로고    scopus 로고
    • http://www.ethereal.com/docs/man-pages/editcap.1.html
    • Editcap,. http://www.ethereal.com/docs/man-pages/editcap.1.html
    • Editcap1
  • 39
    • 59949096619 scopus 로고    scopus 로고
    • http://www.wireshark.org/docs/man-pages/editcap.html
    • Tshark,. http://www.wireshark.org/docs/man-pages/editcap.html
    • Tshark1
  • 43
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • McHugh J., Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory ACM Transactions on Information and System Security 2000 3 4 262 294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 44
    • 33744779904 scopus 로고    scopus 로고
    • Proceedings of the 4th International Conference on Cryptology and Network Security (CANS 05) December 2005 Xiamen, China Springer Lecture Notes in Computer Science
    • Lu W., Traore I., A novel unsupervised anomaly detection framework for detecting network attacks in real-time 3810 Proceedings of the 4th International Conference on Cryptology and Network Security (CANS 05) December 2005 Xiamen, China Springer 96 109 Lecture Notes in Computer Science
    • A novel unsupervised anomaly detection framework for detecting network attacks in real-time , vol.3810 , pp. 96-109
    • Lu, W.1    Traore, I.2
  • 45
    • 59949099179 scopus 로고    scopus 로고
    • http://www.fred-ezone.ca
    • Fred-eZone WiFi ISP,. http://www.fred-ezone.ca
    • Wifi Isp, F.1
  • 49
    • 59949083097 scopus 로고    scopus 로고
    • Denial-of-service tools - Advisory CA-1999-17, December 1999, http://www.cert.org/advisories/CA-1999-17.html
    • CERT Coordination Center,. Denial-of-service tools-Advisory CA-1999-17, December 1999, http://www.cert.org/advisories/CA-1999-17.html
    • Coordination Center, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.