메뉴 건너뛰기




Volumn , Issue , 2009, Pages 448-453

Attribute normalization in network intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

NEAREST NEIGHBOR SEARCH; NETWORK SECURITY;

EID: 77949788147     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/I-SPAN.2009.49     Document Type: Conference Paper
Times cited : (71)

References (26)
  • 3
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Inf. Process. Lett. 76(1-2) (2000) 33-38
    • (2000) Inf. Process. Lett , vol.76 , Issue.1-2 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 4
    • 62349107432 scopus 로고    scopus 로고
    • Distance measures for anomaly intrusion detection
    • Wang, W., Gombault, S.: Distance measures for anomaly intrusion detection. In: Security and Management. (2007) 17-23
    • (2007) Security and Management , pp. 17-23
    • Wang, W.1    Gombault, S.2
  • 6
    • 35048885009 scopus 로고    scopus 로고
    • Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: RAID. (2004) 203-222
    • Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: RAID. (2004) 203-222
  • 7
    • 56549083190 scopus 로고    scopus 로고
    • Nassar, M., State, R., Festor, O.: Monitoring sip traffic using support vector machines. In: RAID. (2008) 311-330
    • Nassar, M., State, R., Festor, O.: Monitoring sip traffic using support vector machines. In: RAID. (2008) 311-330
  • 8
    • 77949866276 scopus 로고    scopus 로고
    • MIT: Mit lincoln laboratory-darpa intrusion detection evaluation (retrieved march 2009) (1999) http://www.ll.mit.edu/mission/communications/ist/ corpora/ideval/index. html.
    • MIT: Mit lincoln laboratory-darpa intrusion detection evaluation (retrieved march 2009) (1999) http://www.ll.mit.edu/mission/communications/ist/ corpora/ideval/index. html.
  • 9
    • 77949861787 scopus 로고    scopus 로고
    • KDD-Data: Kdd cup 1999 data (retrieved march 2009) (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
    • KDD-Data: Kdd cup 1999 data (retrieved march 2009) (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
  • 10
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4) (2000) 262-294
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 11
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • Jin, S., Yeung, D.S., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recognition 40(8) (2007) 2185-2197
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2185-2197
    • Jin, S.1    Yeung, D.S.2    Wang, X.3
  • 12
    • 34248169333 scopus 로고    scopus 로고
    • Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
    • Katos, V.: Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Inf. Sci. 177(15) (2007) 3060-3073
    • (2007) Inf. Sci , vol.177 , Issue.15 , pp. 3060-3073
    • Katos, V.1
  • 15
    • 34548651677 scopus 로고    scopus 로고
    • Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on tcm-knn algorithm. In: ASIACCS. (2007) 13-19
    • Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on tcm-knn algorithm. In: ASIACCS. (2007) 13-19
  • 16
    • 51849135423 scopus 로고    scopus 로고
    • Ma, W., Tran, D., Sharma, D.: A study on the feature selection of network traffic for intrusion detection purpose. In: ISI. (2008) 245-247
    • Ma, W., Tran, D., Sharma, D.: A study on the feature selection of network traffic for intrusion detection purpose. In: ISI. (2008) 245-247
  • 17
    • 33750516723 scopus 로고    scopus 로고
    • Adaptive anomaly detection with evolving connectionist systems
    • Liao, Y., Vemuri, V.R., Pasos, A.: Adaptive anomaly detection with evolving connectionist systems. J. Network and Computer Applications 30(1) (2007) 60-80
    • (2007) J. Network and Computer Applications , vol.30 , Issue.1 , pp. 60-80
    • Liao, Y.1    Vemuri, V.R.2    Pasos, A.3
  • 19
    • 33750949942 scopus 로고    scopus 로고
    • Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES. (2006) 270-279
    • Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES. (2006) 270-279
  • 20
    • 37049002837 scopus 로고    scopus 로고
    • Processing of massive audit data streams for real-time anomaly intrusion detection
    • Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications 31(1) (2008) 58-72
    • (2008) Computer Communications , vol.31 , Issue.1 , pp. 58-72
    • Wang, W.1    Guan, X.2    Zhang, X.3
  • 26
    • 77949853640 scopus 로고    scopus 로고
    • Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
    • Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.