메뉴 건너뛰기




Volumn 204, Issue , 2009, Pages 377-394

Mining network traffic data for attacks through MOVICAB-IDS

Author keywords

Artificial Neural Networks; Computer Network Security; Data Mining; Intrusion Detection; Unsupervised Learning

Indexed keywords


EID: 65549109478     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-01088-0_16     Document Type: Article
Times cited : (12)

References (50)
  • 2
    • 4344588856 scopus 로고    scopus 로고
    • Detecting New Forms of Network Intrusion Using Genetic Programming
    • Lu, W., Traore, I.: Detecting New Forms of Network Intrusion Using Genetic Programming. Computational Intelligence 20(3), 475-494 (2004)
    • (2004) Computational Intelligence , vol.20 , Issue.3 , pp. 475-494
    • Lu, W.1    Traore, I.2
  • 3
    • 27544512530 scopus 로고    scopus 로고
    • - Data Mining for Intrusion Detection: A Critical Review
    • Advances in Information Security. Springer, Heidelberg
    • Julisch, K.: Chapter 1 - Data Mining for Intrusion Detection: A Critical Review. In: Applications of Data Mining in Computer Security. Advances in Information Security. Springer, Heidelberg (2002)
    • (2002) Applications of Data Mining in Computer Security
    • Julisch, K.1
  • 4
    • 84885774862 scopus 로고    scopus 로고
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. In: ACM Transactions on Information and System Security (TIS-SEC), 3(4), pp. 227-261. ACM Press, New York (2000)
    • Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. In: ACM Transactions on Information and System Security (TIS-SEC), vol. 3(4), pp. 227-261. ACM Press, New York (2000)
  • 5
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-Nearest Neighbor Classifier for Intrusion Detection
    • Liao, Y.H., Vemuri, V.R.: Use of K-Nearest Neighbor Classifier for Intrusion Detection. Computers & Security 21(5), 439-448 (2002)
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.H.1    Vemuri, V.R.2
  • 6
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive Intrusion Detection: A Data Mining Approach
    • Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review 14(6), 533-567 (2000)
    • (2000) Artificial Intelligence Review , vol.14 , Issue.6 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 7
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks
    • Giacinto, G., Roli, F., Didaci, L.: Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks. Pattern Recognition Letters 24(12), 1795-1803 (2003)
    • (2003) Pattern Recognition Letters , vol.24 , Issue.12 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 8
    • 19944364877 scopus 로고    scopus 로고
    • Feature Deduction and Ensemble Design of Intrusion Detection Systems
    • Chebrolu, S., Abraham, A., Thomas, J.P.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security 24(4), 295-307 (2005)
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 14
    • 33646252706 scopus 로고    scopus 로고
    • Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
    • Duch, W, Kacprzyk, J, Oja, E, Zadro ny, S, eds, ICANN 2005, Springer, Heidelberg
    • Corchado, E., Herrero, A., Sáiz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro ny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905-910. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3697 , pp. 905-910
    • Corchado, E.1    Herrero, A.2    Sáiz, J.M.3
  • 15
    • 26844471735 scopus 로고    scopus 로고
    • Herrero, A., Corchado, E., Sáiz, J.M.: An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, 3610, pp. 778-782. Springer, Heidelberg (2005)
    • Herrero, A., Corchado, E., Sáiz, J.M.: An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3610, pp. 778-782. Springer, Heidelberg (2005)
  • 17
    • 0242489523 scopus 로고    scopus 로고
    • Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines
    • Mukkamala, S., Sung, A.H.: Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines. Transportation Security and Infrastructure Protection, 33-39 (2003)
    • (2003) Transportation Security and Infrastructure Protection , pp. 33-39
    • Mukkamala, S.1    Sung, A.H.2
  • 18
    • 15944375471 scopus 로고    scopus 로고
    • Intrusion Detection Using Hierarchical Neural Networks
    • Zhang, C.L., Jiang, J., Kamel, M.: Intrusion Detection Using Hierarchical Neural Networks. Pattern Recognition Letters 26(6), 779-791 (2005)
    • (2005) Pattern Recognition Letters , vol.26 , Issue.6 , pp. 779-791
    • Zhang, C.L.1    Jiang, J.2    Kamel, M.3
  • 21
    • 33745653877 scopus 로고    scopus 로고
    • Muelder, C., Ma, K.L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Zamboni, D., Kruegel, C. (eds.) RAID 2005. LNCS, 3858, pp. 265-283. Springer, Heidelberg (2006)
    • Muelder, C., Ma, K.L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Zamboni, D., Kruegel, C. (eds.) RAID 2005. LNCS, vol. 3858, pp. 265-283. Springer, Heidelberg (2006)
  • 23
    • 33645805216 scopus 로고    scopus 로고
    • An Application of Principal Component Analysis to the Detection and Visualization of Computer Network Attacks
    • Labib, K., Vemuri, V.R.: An Application of Principal Component Analysis to the Detection and Visualization of Computer Network Attacks. Annals of Telecommunications 61(1-2), 218-234 (2006)
    • (2006) Annals of Telecommunications , vol.61 , Issue.1-2 , pp. 218-234
    • Labib, K.1    Vemuri, V.R.2
  • 26
    • 70349568270 scopus 로고    scopus 로고
    • Visual Information Seeking: Tight Coupling of Dynamic Query Filters with Starfield Displays
    • Morgan Kaufmann Publishers Inc, San Francisco
    • Ahlberg, C., Shneiderman, B.: Visual Information Seeking: Tight Coupling of Dynamic Query Filters with Starfield Displays. In: Readings in information visualization: Using vision to think, pp. 244-250. Morgan Kaufmann Publishers Inc., San Francisco (1999)
    • (1999) Readings in information visualization: Using vision to think , pp. 244-250
    • Ahlberg, C.1    Shneiderman, B.2
  • 28
    • 0028401306 scopus 로고
    • Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches
    • Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
    • (1994) AI Communications , vol.7 , Issue.1 , pp. 39-59
    • Aamodt, A.1    Plaza, E.2
  • 30
    • 0001710505 scopus 로고
    • Analysis of a Complex of Statistical Variables Into Principal Components
    • Hotelling, H.: Analysis of a Complex of Statistical Variables Into Principal Components. Journal of Education Psychology 24, 417-444 (1933)
    • (1933) Journal of Education Psychology , vol.24 , pp. 417-444
    • Hotelling, H.1
  • 31
    • 0000325341 scopus 로고
    • On Lines and Planes of Closest Fit to Systems of Points in Space
    • Pearson, K.: On Lines and Planes of Closest Fit to Systems of Points in Space. Philosophical Magazine 2(6), 559-572 (1901)
    • (1901) Philosophical Magazine , vol.2 , Issue.6 , pp. 559-572
    • Pearson, K.1
  • 32
    • 0002399288 scopus 로고
    • Neural networks, principal components, and subspaces
    • Oja, E.: Neural networks, principal components, and subspaces. Int. Journal of Neural Systems 1, 61-68 (1989)
    • (1989) Int. Journal of Neural Systems , vol.1 , pp. 61-68
    • Oja, E.1
  • 33
    • 0016102310 scopus 로고
    • A Projection Pursuit Algorithm for Exploratory Data-Analysis
    • Friedman, J.H., Tukey, J.W.: A Projection Pursuit Algorithm for Exploratory Data-Analysis. IEEE Transactions on Computers 23(9), 881-890 (1974)
    • (1974) IEEE Transactions on Computers , vol.23 , Issue.9 , pp. 881-890
    • Friedman, J.H.1    Tukey, J.W.2
  • 34
    • 0001493668 scopus 로고
    • Asymptotics of Graphical Projection Pursuit
    • Diaconis, P., Freedman, D.: Asymptotics of Graphical Projection Pursuit. The Annals of Statistics 12(3), 793-815 (1984)
    • (1984) The Annals of Statistics , vol.12 , Issue.3 , pp. 793-815
    • Diaconis, P.1    Freedman, D.2
  • 35
    • 3543075142 scopus 로고    scopus 로고
    • Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
    • Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery 8(3), 203-225 (2004)
    • (2004) Data Mining and Knowledge Discovery , vol.8 , Issue.3 , pp. 203-225
    • Corchado, E.1    MacDonald, D.2    Fyfe, C.3
  • 37
    • 0842267461 scopus 로고    scopus 로고
    • Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors
    • Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. Int. Journal of Pattern Recognition and Artificial Intelligence 17(8), 1447-1466 (2003)
    • (2003) Int. Journal of Pattern Recognition and Artificial Intelligence , vol.17 , Issue.8 , pp. 1447-1466
    • Corchado, E.1    Fyfe, C.2
  • 40
    • 0025489075 scopus 로고
    • The Self-Organizing Map
    • Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE 78(9), 1464-1480 (1990)
    • (1990) Proceedings of the IEEE , vol.78 , Issue.9 , pp. 1464-1480
    • Kohonen, T.1
  • 43
    • 0344012555 scopus 로고    scopus 로고
    • Constructing Deliberative Agents with Case-Based Reasoning Technology
    • Corchado, J.M., Laza, R.: Constructing Deliberative Agents with Case-Based Reasoning Technology. International Journal of Intelligent Systems 18(12), 1227-1241 (2003)
    • (2003) International Journal of Intelligent Systems , vol.18 , Issue.12 , pp. 1227-1241
    • Corchado, J.M.1    Laza, R.2
  • 47
    • 0036570725 scopus 로고    scopus 로고
    • Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
    • Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
  • 49
    • 4243116400 scopus 로고    scopus 로고
    • The Spinning Cube of Potential Doom
    • Stephen, L.: The Spinning Cube of Potential Doom. Commun. ACM 47(6), 25-26 (2004)
    • (2004) Commun. ACM , vol.47 , Issue.6 , pp. 25-26
    • Stephen, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.