메뉴 건너뛰기




Volumn , Issue , 2008, Pages 517-523

Noise-resistant payload anomaly detection for network intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTIONS; ANOMALY-BASED INTRUSION DETECTIONS; DETECTION SCHEMES; FALSE POSITIVES; GLOBAL SECURITIES; INTRUSION DETECTION SCHEMES; NETWORK INTRUSION DETECTION SYSTEMS; PACKET DETECTIONS; TEST RESULTS; TUNING PARAMETERS;

EID: 62849113350     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2008.4745080     Document Type: Conference Paper
Times cited : (7)

References (18)
  • 3
    • 62849093564 scopus 로고    scopus 로고
    • Experiences with emerald to date
    • P. G. Neumann and P. A. Poras, "Experiences with emerald to date," in RAID 1999.
    • (1999) RAID
    • Neumann, P.G.1    Poras, P.A.2
  • 9
    • 34248377875 scopus 로고    scopus 로고
    • Svision: A novel visual network-anomaly identification technique
    • May
    • I. Onuta and A. Ghorbani, "Svision: A novel visual network-anomaly identification technique," computers and Security, vol. 26, Issue 3, pp 201-212, May 2007.
    • (2007) computers and Security , vol.26 , Issue.3 , pp. 201-212
    • Onuta, I.1    Ghorbani, A.2
  • 11
    • 34548720822 scopus 로고    scopus 로고
    • An application of principal component analysis to the detection and visualization of computer network attacks
    • Nov./Dec
    • K. Labib and V. R. Vemuri, "An application of principal component analysis to the detection and visualization of computer network attacks," Annals of Telecommunications, Nov./Dec. 2005.
    • (2005) Annals of Telecommunications
    • Labib, K.1    Vemuri, V.R.2
  • 13
    • 0242456143 scopus 로고    scopus 로고
    • Nate-network analysis of anomolous traffic events, a low cost approach
    • C. Taylor and J. Alves-Foss, "Nate-network analysis of anomolous traffic events, a low cost approach," in NSPW 2001.
    • NSPW 2001
    • Taylor, C.1    Alves-Foss, J.2
  • 15
    • 35348910615 scopus 로고    scopus 로고
    • Anagram: A content anomaly detector resistant to mimicry attack
    • K. Wang, J. J. Parekh, and S. J. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack," in RAID 2006.
    • RAID 2006
    • Wang, K.1    Parekh, J.J.2    Stolfo, S.J.3
  • 18
    • 62849119963 scopus 로고    scopus 로고
    • I. T. Jolliffe, principal Component Analysis. New York: Springer, 1986.
    • I. T. Jolliffe, principal Component Analysis. New York: Springer, 1986.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.