메뉴 건너뛰기




Volumn 10, Issue 4, 2009, Pages 274-284

Information fusion for computer security: State of the art and open issues

Author keywords

Computer security; Information fusion

Indexed keywords

COMPUTER SECURITY; PROBLEM FORMULATION; RESEARCH ISSUES; STATE OF THE ART;

EID: 67349154442     PISSN: 15662535     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.inffus.2009.03.001     Document Type: Article
Times cited : (52)

References (59)
  • 4
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Bass T. Intrusion detection systems and multisensor data fusion. Communications of the ACM 43 4 (2000) 99-105
    • (2000) Communications of the ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 5
    • 35348828484 scopus 로고    scopus 로고
    • Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks
    • Cabrera J.B., Gutierrez C., and Mehra R.K. Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad-hoc networks. International Journal on Information Fusion 9 1 (2008) 96-119
    • (2008) International Journal on Information Fusion , vol.9 , Issue.1 , pp. 96-119
    • Cabrera, J.B.1    Gutierrez, C.2    Mehra, R.K.3
  • 7
    • 0036871268 scopus 로고    scopus 로고
    • Internet infrastructure security: a taxonomy
    • Chakrabarti A., and Manimaran G. Internet infrastructure security: a taxonomy. IEEE Network Magazine 16 6 (2002) 13-21
    • (2002) IEEE Network Magazine , vol.16 , Issue.6 , pp. 13-21
    • Chakrabarti, A.1    Manimaran, G.2
  • 9
    • 42449088159 scopus 로고    scopus 로고
    • Intrusion detection in computer systems using multiple classifier systems
    • Okun O., and Valentini G. (Eds), Springer-Verlag, Berling/Heidelber
    • Corona I., Giacinto G., and Roli F. Intrusion detection in computer systems using multiple classifier systems. In: Okun O., and Valentini G. (Eds). Supervised and Unsupervised Ensemble Methods and Their Applications (2008), Springer-Verlag, Berling/Heidelber 91-104
    • (2008) Supervised and Unsupervised Ensemble Methods and Their Applications , pp. 91-104
    • Corona, I.1    Giacinto, G.2    Roli, F.3
  • 11
    • 0038428854 scopus 로고    scopus 로고
    • Results of the KDD99 classifier learning
    • Elkan C. Results of the KDD99 classifier learning. SIGKDD Explorations Journal ACM 1 (2000) 63-64
    • (2000) SIGKDD Explorations Journal ACM , vol.1 , pp. 63-64
    • Elkan, C.1
  • 14
    • 67349161288 scopus 로고    scopus 로고
    • Information fusion techniques for reliably training intrusion detection systems
    • Singh M., and Singh S. (Eds), Springer-Verlag, London
    • Gargiulo F., Mazzariello C., and Sansone C. Information fusion techniques for reliably training intrusion detection systems. In: Singh M., and Singh S. (Eds). Progress in Pattern Recognition (2007), Springer-Verlag, London 27-36
    • (2007) Progress in Pattern Recognition , pp. 27-36
    • Gargiulo, F.1    Mazzariello, C.2    Sansone, C.3
  • 17
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion detection in computer networks
    • Giacinto G., Roli F., and Didaci L. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24 12 (2003) 1795-1803
    • (2003) Pattern Recognition Letters , vol.24 , Issue.12 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 21
    • 42749086845 scopus 로고    scopus 로고
    • A "No Panacea Theorem" for classifier combination
    • Hu R., and Damper R.I. A "No Panacea Theorem" for classifier combination. Pattern Recognition Journal 41 8 (2008) 2665-2673
    • (2008) Pattern Recognition Journal , vol.41 , Issue.8 , pp. 2665-2673
    • Hu, R.1    Damper, R.I.2
  • 22
    • 0037629724 scopus 로고    scopus 로고
    • Y. Huang, W. Fan, W. Lee, P.S. Yu, Cross-feature analysis for detecting ad-hoc routing anomalies, in: Proceedings of the 23rd International Conference on Distributed Computing Systems, May 2003, pp. 478-487.
    • Y. Huang, W. Fan, W. Lee, P.S. Yu, Cross-feature analysis for detecting ad-hoc routing anomalies, in: Proceedings of the 23rd International Conference on Distributed Computing Systems, May 2003, pp. 478-487.
  • 23
    • 0029230267 scopus 로고
    • A method of combining multiple experts for the recognition of unconstrained handwritten numerals
    • Huang Y.S., and Suen C.Y. A method of combining multiple experts for the recognition of unconstrained handwritten numerals. IEEE Transactions on Pattern Analysis and Machine Intelligence 17 1 (1995) 90-94
    • (1995) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.17 , Issue.1 , pp. 90-94
    • Huang, Y.S.1    Suen, C.Y.2
  • 26
    • 39049159757 scopus 로고    scopus 로고
    • B.M. Kowalski, D.K. Bertolino, S. Basagni, Hack Boston: monitoring wireless security awareness in an urban setting, in: Proceedings of the Canadian Conference on Electrical and Computer Engineering, May 2006, pp. 1308-1311.
    • B.M. Kowalski, D.K. Bertolino, S. Basagni, Hack Boston: monitoring wireless security awareness in an urban setting, in: Proceedings of the Canadian Conference on Electrical and Computer Engineering, May 2006, pp. 1308-1311.
  • 32
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information Systems Security 3 4 (2000) 227-261
    • (2000) ACM Transactions on Information Systems Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 35
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information System Security Journal 3 4 (2000) 262-294
    • (2000) ACM Transactions on Information System Security Journal , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 38
    • 34548629412 scopus 로고    scopus 로고
    • Information fusion for wireless sensor networks: methods, models, and classification
    • article 9
    • Nakamura E.F., Loureiro A.A.F., and Frery A.C. Information fusion for wireless sensor networks: methods, models, and classification. ACM Journal on Computing Surveys 39 3 (2007) 55 article 9
    • (2007) ACM Journal on Computing Surveys , vol.39 , Issue.3 , pp. 55
    • Nakamura, E.F.1    Loureiro, A.A.F.2    Frery, A.C.3
  • 39
    • 84858583294 scopus 로고    scopus 로고
    • National Institute of Standards and Technology, Information Technology Laboratory, Computer Security Division, Standards for Security Categorization of Federal Information and Information Systems, accessed March 2009
    • National Institute of Standards and Technology, Information Technology Laboratory, Computer Security Division, Standards for Security Categorization of Federal Information and Information Systems, Federal Information Processing Standards Publication 199, 2004, (accessed March 2009).
    • (2004) Federal Information Processing Standards Publication , vol.199
  • 40
    • 49949086459 scopus 로고    scopus 로고
    • REFACING: an autonomic approach to network security based on multidimensional trustworthiness
    • Oliviero F., Peluso L., and Romano S.P. REFACING: an autonomic approach to network security based on multidimensional trustworthiness. Computer Networks Magazine 52 (2008) 2745-2763
    • (2008) Computer Networks Magazine , vol.52 , pp. 2745-2763
    • Oliviero, F.1    Peluso, L.2    Romano, S.P.3
  • 42
    • 3042737904 scopus 로고    scopus 로고
    • Wireless security's future
    • Potter B. Wireless security's future. IEEE Security and Privacy 1 4 (2003) 68-72
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4 , pp. 68-72
    • Potter, B.1
  • 43
  • 45
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian paradigm for designing intrusion detection systems
    • Scott S.L. A Bayesian paradigm for designing intrusion detection systems. Computational Statistics and Data Analysis Journal 45 1 (2004) 69-83
    • (2004) Computational Statistics and Data Analysis Journal , vol.45 , Issue.1 , pp. 69-83
    • Scott, S.L.1
  • 53
    • 78049324449 scopus 로고    scopus 로고
    • Correlation analysis of intrusion alerts
    • Roberto Di Pietro, Luigi V. Mancini Eds, Intrusion Detection Systems
    • D. Xu, P. Ning, Correlation analysis of intrusion alerts, in: Roberto Di Pietro, Luigi V. Mancini (Eds.), Intrusion Detection Systems, Series on Advances in Information Security, vol. 38, 2008, pp. 65-92.
    • (2008) Series on Advances in Information Security , vol.38 , pp. 65-92
    • Xu, D.1    Ning, P.2
  • 54
    • 0026860706 scopus 로고
    • Methods for combining multiple classifiers and their applications to handwriting recognition
    • Xu L., Krzyzak A., and Suen C.Y. Methods for combining multiple classifiers and their applications to handwriting recognition. IEEE Transactions on Systems Man and Cybernetics 22 (1992) 418-435
    • (1992) IEEE Transactions on Systems Man and Cybernetics , vol.22 , pp. 418-435
    • Xu, L.1    Krzyzak, A.2    Suen, C.Y.3
  • 55
    • 77953769194 scopus 로고    scopus 로고
    • Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
    • ACM
    • D. Yu, D. Frincke, Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory, in: Proceedings of the 43rd Annual Southeast Regional Conference, vol. 2, ACM, 2005, pp. 142-147.
    • (2005) Proceedings of the 43rd Annual Southeast Regional Conference , vol.2 , pp. 142-147
    • Yu, D.1    Frincke, D.2
  • 56
  • 57
    • 33644998121 scopus 로고    scopus 로고
    • Active and dynamic information fusion for multisensor systems with dynamic bayesian networks
    • Zhang Y., and Ji Q. Active and dynamic information fusion for multisensor systems with dynamic bayesian networks. IEEE Transactions on Systems, Man, and Cybernetics Part B 36 2 (2006) 467-472
    • (2006) IEEE Transactions on Systems, Man, and Cybernetics Part B , vol.36 , Issue.2 , pp. 467-472
    • Zhang, Y.1    Ji, Q.2
  • 59
    • 51149084743 scopus 로고    scopus 로고
    • A self-healing, self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains
    • 7-11 April
    • C.V. Zhou, C. Leckie, S. Karunasekera, T. Peng, A self-healing, self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains, in: IEEE Network Operations and Management Symposium Workshop, 7-11 April 2008, pp. 321-327.
    • (2008) IEEE Network Operations and Management Symposium Workshop , pp. 321-327
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3    Peng, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.