메뉴 건너뛰기




Volumn 180, Issue 12, 2010, Pages 2375-2389

Anomaly intrusion detection by clustering transactional audit streams in a host computer

Author keywords

Anomaly detection; Clustering data streams; Intrusion detection

Indexed keywords

ANOMALY DETECTION; ANOMALY INTRUSION DETECTION; AUDIT DATA; CLUSTERING DATA; CLUSTERING DATA STREAMS; CONVENTIONAL DATA MINING; DATA STREAM; FREQUENCY RANGES; HOST COMPUTERS; NORMAL BEHAVIOR; STATIC BEHAVIORS; STATISTICAL GRID-BASED CLUSTERING;

EID: 77950298520     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2010.03.001     Document Type: Article
Times cited : (27)

References (25)
  • 3
    • 33748676847 scopus 로고    scopus 로고
    • Finding recently frequent itemsets adaptively over online transactional data streams
    • Chang J.H., and Lee W.S. Finding recently frequent itemsets adaptively over online transactional data streams. Information Systems 31 8 (2006) 849-869
    • (2006) Information Systems , vol.31 , Issue.8 , pp. 849-869
    • Chang, J.H.1    Lee, W.S.2
  • 5
    • 77950296904 scopus 로고    scopus 로고
    • DARPA Intrusion Detection Evaluation
    • DARPA Intrusion Detection Evaluation, .
  • 11
    • 0001457509 scopus 로고    scopus 로고
    • Some methods for classification and analysis of multivariate observations
    • J. MacQueen, Some methods for classification and analysis of multivariate observations, in: Proceedings of the Fifth Berkeley Symposium, 1996, pp. 281-297.
    • (1996) Proceedings of the Fifth Berkeley Symposium , pp. 281-297
    • MacQueen, J.1
  • 13
    • 77950300037 scopus 로고
    • The NIDES statistical component description and justification, Annual report, SRI International
    • Harold S. Javitz, Alfonso Valdes, The NIDES statistical component description and justification, Annual report, SRI International, 1994.
    • (1994)
    • Javitz, H.S.1    Valdes, A.2
  • 14
    • 34248169333 scopus 로고    scopus 로고
    • Network intrusion detection: evaluating cluster, discriminant, and logit analysis
    • Katos V. Network intrusion detection: evaluating cluster, discriminant, and logit analysis. Information Sciences 177 15 (2007) 3060-3073
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3060-3073
    • Katos, V.1
  • 17
    • 0242468747 scopus 로고    scopus 로고
    • An anomaly intrusion detection method by clustering normal user behavior
    • Oh S.H., and Lee W.S. An anomaly intrusion detection method by clustering normal user behavior. Computers and Security 22 7 (2003) 596-612
    • (2003) Computers and Security , vol.22 , Issue.7 , pp. 596-612
    • Oh, S.H.1    Lee, W.S.2
  • 18
    • 14344255219 scopus 로고    scopus 로고
    • A statistical grid-based clustering over data streams
    • Park N.H., and Lee W.S. A statistical grid-based clustering over data streams. ACM SIGMOD Record 33 1 (2004) 32-37
    • (2004) ACM SIGMOD Record , vol.33 , Issue.1 , pp. 32-37
    • Park, N.H.1    Lee, W.S.2
  • 20
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • Shon T., and Moon J. A hybrid machine learning approach to network anomaly detection. Information Sciences 177 18 (2007) 3799-3821
    • (2007) Information Sciences , vol.177 , Issue.18 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 25
    • 68349136832 scopus 로고    scopus 로고
    • Frequency-based load shedding over a data stream of tuples
    • Chang J.H., and Kum H.-C. Frequency-based load shedding over a data stream of tuples. Information Sciences 179 21 (2009) 3733-3744
    • (2009) Information Sciences , vol.179 , Issue.21 , pp. 3733-3744
    • Chang, J.H.1    Kum, H.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.