메뉴 건너뛰기




Volumn 32, Issue 6, 2009, Pages 1104-1110

Efficient deterministic method for detecting new U2R attacks

Author keywords

Behavior classes; Data mining (KDD) dataset; Knowledge discovery; Linear programming system; Misuse detection; Simulation tool

Indexed keywords

DYNAMIC PROGRAMMING; INFORMATION MANAGEMENT; LINEAR PROGRAMMING; LINEARIZATION; OPTIMIZATION; PARTICLE SIZE ANALYSIS; TOOLS;

EID: 61849175333     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.12.037     Document Type: Article
Times cited : (19)

References (10)
  • 1
    • 0009518853 scopus 로고    scopus 로고
    • A scalable clustering technique for intrusion signature recognition
    • US Military Academy, West Point, NY, 5-6 June
    • N. Ye, X. Li, A scalable clustering technique for intrusion signature recognition, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY, 5-6 June 2001, pp. 1-4.
    • (2001) Proceedings of the 2001 IEEE Workshop on Information Assurance and Security , pp. 1-4
    • Ye, N.1    Li, X.2
  • 4
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 4 (2000) 227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 5
    • 0344008570 scopus 로고    scopus 로고
    • Detecting Novel Attacks by Identifying Anomalous Network Packet Headers
    • Technical Report, Florida Institute of Technology, CS-2001-2
    • M.V. Mahoney, P.K. Chan, Detecting Novel Attacks by Identifying Anomalous Network Packet Headers, Technical Report, Florida Institute of Technology, CS-2001-2, 2001.
    • (2001)
    • Mahoney, M.V.1    Chan, P.K.2
  • 6
    • 4544373082 scopus 로고    scopus 로고
    • Detecting low-profile probes and novel denial-of-service attacks
    • United States Military Academy, West Point, NY, 5-6 June
    • R. Basu et al., Detecting low-profile probes and novel denial-of-service attacks, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June 2001.
    • (2001) Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
    • Basu, R.1
  • 7
    • 10644257876 scopus 로고    scopus 로고
    • Modelling and solving the intrusion detection problem in computer networks
    • Beghdad R. Modelling and solving the intrusion detection problem in computer networks. Computers & Security Journal 23 8 (2004) 687-696
    • (2004) Computers & Security Journal , vol.23 , Issue.8 , pp. 687-696
    • Beghdad, R.1
  • 8
    • 61849152530 scopus 로고    scopus 로고
    • Selecting KDD features and using random classification tree for predicting attacks
    • Beghdad R. Selecting KDD features and using random classification tree for predicting attacks. International Scientific Journal of Computing 6 3 (2007) 115-123
    • (2007) International Scientific Journal of Computing , vol.6 , Issue.3 , pp. 115-123
    • Beghdad, R.1
  • 9
    • 61849164695 scopus 로고    scopus 로고
    • Available from:, accessed July 2006
    • KDD data set, 1999. Available from: (accessed July 2006).
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.