메뉴 건너뛰기




Volumn , Issue , 2006, Pages 488-498

Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION SYSTEMS; BYTE SUBSTITUTIONS; MIMICRY ATTACKS; PACKET CONTENTS; PADDING TECHNIQUES;

EID: 60349101742     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDM.2006.165     Document Type: Conference Paper
Times cited : (192)

References (29)
  • 1
    • 84878041682 scopus 로고    scopus 로고
    • Securityfocus (BID 2674). Microsoft IIS 5.0 .printer ISAPI Extension buffer overflow vulnerability, 2006.
    • Securityfocus (BID 2674). Microsoft IIS 5.0 .printer ISAPI Extension buffer overflow vulnerability, 2006.
  • 2
    • 84878104803 scopus 로고    scopus 로고
    • Securityfocus (BID 3526). ActivePerl perlIIS.dll buffer overflow vulnerability, 2006.
    • Securityfocus (BID 3526). ActivePerl perlIIS.dll buffer overflow vulnerability, 2006.
  • 7
    • 2942723846 scopus 로고    scopus 로고
    • A divisive information-theoretic feature clustering algorithm for text classification
    • I. S. Dhillon, S. Mallela, and R. Kumar. A divisive information-theoretic feature clustering algorithm for text classification. Journal of Machine Learning Research, 3:1265-1287, 2003.
    • (2003) Journal of Machine Learning Research , vol.3 , pp. 1265-1287
    • Dhillon, I.S.1    Mallela, S.2    Kumar, R.3
  • 10
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • D. Barbara and S. Jajodia, editors, Kluwer
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In D. Barbara and S. Jajodia, editors, Applications of Data Mining in Computer Security. Kluwer, 2002.
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 13
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • G. Giacinto, F. Roli, and L. Didaci. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters, 24(12): 1795-1803, 2003.
    • (2003) Pattern Recognition Letters , vol.24 , Issue.12 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 17
    • 0036161242 scopus 로고    scopus 로고
    • Text categorization with support vector machines. How to represent texts in input space?
    • E. Leopold and J. Kindermann. Text categorization with support vector machines. How to represent texts in input space? Machine Learning, 46:423-444, 2002.
    • (2002) Machine Learning , vol.46 , pp. 423-444
    • Leopold, E.1    Kindermann, J.2
  • 19
    • 0034270431 scopus 로고    scopus 로고
    • Defending your-self: The role of intrusion detection systems
    • Sept./Oct
    • J. McHugh, A. Christie, and J. Allen. Defending your-self: The role of intrusion detection systems. IEEE Software, pages 42-51, Sept./Oct. 2000.
    • (2000) IEEE Software , pp. 42-51
    • McHugh, J.1    Christie, A.2    Allen, J.3
  • 22
    • 0002442796 scopus 로고    scopus 로고
    • Machine learning in automated text categorization
    • March
    • F. Sebastiani. Machine learning in automated text categorization. ACM Computing Surveys, 34(1): 1-47, March 2002.
    • (2002) ACM Computing Surveys , vol.34 , Issue.1 , pp. 1-47
    • Sebastiani, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.