메뉴 건너뛰기




Volumn , Issue , 2009, Pages

A self-organizing map and its modeling for discovering malignant network traffic

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET FIREWALLS; KNOWLEDGE DISCOVERY; MODEL-BASED INTRUSION DETECTION; NETWORK ACTIVITIES; NETWORK TRAFFIC; SECURITY ISSUES;

EID: 67650462942     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CICYBS.2009.4925099     Document Type: Conference Paper
Times cited : (23)

References (38)
  • 1
    • 62849125514 scopus 로고    scopus 로고
    • Hackers take down the most wired country in europe
    • September
    • J. Davis, "Hackers take down the most wired country in europe," Wired, Vol. 15, no. 9, September 2007.
    • (2007) Wired , vol.15 , Issue.9
    • Davis, J.1
  • 2
    • 62849111634 scopus 로고    scopus 로고
    • When bots attack
    • September, 2007
    • J. Robb, "When bots attack," Wired, Vol. 15, no. 9, September, 2007 2007.
    • (2007) Wired , vol.15 , Issue.9
    • Robb, J.1
  • 9
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • Purdue University
    • S. Kumar and E. Spafford, "An application of pattern matching in intrusion detection," Purdue University, Tech. Rep., 1994.
    • (1994) Tech. Rep.
    • Kumar, S.1    Spafford, E.2
  • 10
    • 27844484884 scopus 로고    scopus 로고
    • Intrusion detection: A survey
    • V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer
    • A. Lazarevic, V. Kumar, and J. Srivastava, "Intrusion detection: A survey," in Managing Cyber Threats, V. Kumar, J. Srivastava, and A. Lazarevic, Eds. Springer, 2005, pp. 19-78.
    • (2005) Managing Cyber Threats , pp. 19-78
    • Lazarevic, A.1    Kumar, V.2    Srivastava, J.3
  • 13
    • 51249194645 scopus 로고
    • A logical calculus of the ideas immanent in nervous activity
    • W. S. McCulloch and W. Pitts, "A logical calculus of the ideas immanent in nervous activity," Bulletin of Mathematical Biophysics, Vol. 5, pp. 115-133, 1943.
    • (1943) Bulletin of Mathematical Biophysics , vol.5 , pp. 115-133
    • McCulloch, W.S.1    Pitts, W.2
  • 17
    • 72149083642 scopus 로고    scopus 로고
    • Computer network user behavior visualization using self-organizing maps
    • A. Hoglund and K. Hatonen, "Computer network user behavior visualization using self-organizing maps," in ICANN, 1998, pp. 899-904.
    • (1998) ICANN , pp. 899-904
    • Hoglund, A.1    Hatonen, K.2
  • 23
    • 0033683805 scopus 로고    scopus 로고
    • A computer host based user anomaly detection system using the self organizing map
    • IEEE IJCNN
    • A. Hoglund, K. Hatonen, and A. Sorvari, "A computer host based user anomaly detection system using the self organizing map," in International Joint Conference on Neural Networks, IEEE IJCNN, Vol. 5, 2002, pp. 411-416.
    • (2002) International Joint Conference on Neural Networks , vol.5 , pp. 411-416
    • Hoglund, A.1    Hatonen, K.2    Sorvari, A.3
  • 25
    • 35248842651 scopus 로고    scopus 로고
    • Detecting Anomalous Network Traffic with Self-organizing Maps
    • Recent Advances in Intrusion Detection
    • M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, ser. Lecture Notes in Computer Science, G. Vigna, E. Jonsson, and C. Kruegel, Eds., Vol. 2820. Pittsburgh, PA, USA: Springer-Verlag, 2003, pp. 36-54. (Pubitemid 37171491)
    • (2003) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2820 , pp. 36-54
    • Ramadas, M.1    Ostermann, S.2    Tjaden, B.3
  • 30
    • 25844491810 scopus 로고    scopus 로고
    • An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
    • DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
    • O. Depren, M. Topallar, E. Anarim, and M. Ciliz, "An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks," Expert Systems with Applications, Vol. 29, no. 4, pp. 713-722, 2005. (Pubitemid 41394445)
    • (2005) Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 32
    • 33750136508 scopus 로고    scopus 로고
    • Training the SOFM efficiently: An example from intrusion detection
    • DOI 10.1109/IJCNN.2005.1556113, 1556113, Proceedings of the International Joint Conference on Neural Networks, IJCNN 2005
    • L. Wetmore, A. N. Zincir-Heywood, and M. Heywood, "Training the sofm efficiently: An example from intrusion detection," in IEEE Internation Joing Conference on Neural Networks, IJCNN 2005, 2005, pp. 1575-1580. (Pubitemid 44591437)
    • (2005) Proceedings of the International Joint Conference on Neural Networks , vol.3 , pp. 1575-1580
    • Wetmore, L.1    Zincir-Heywood, A.N.2    Heywood, M.I.3
  • 33
    • 67650386290 scopus 로고    scopus 로고
    • Using self-organizing maps to build and attack map for forensic analysis
    • Security, and Trust (PST 2006)
    • H. G. Kayacik and A. N. Zincir-Heywood, "Using self-organizing maps to build and attack map for forensic analysis," in ACM International Conference on Privacy, Security, and Trust (PST 2006), 2006, pp. 285-293.
    • (2006) ACM International Conference on Privacy , pp. 285-293
    • Kayacik, H.G.1    Zincir-Heywood, A.N.2
  • 36
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows with hidden markov model
    • S.-B. Cho and H.-J. Park, "Efficient anomaly detection by modeling privilege flows with hidden markov model," Computers and Security, Vol. 22, no. 1, pp. 45-55, 2003.
    • (2003) Computers and Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.-B.1    Park, H.-J.2
  • 38
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Transactions on Information and System Security, Vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.