메뉴 건너뛰기




Volumn , Issue , 2010, Pages 285-289

A flow based anomaly detection system using chi-square technique

Author keywords

Anomaly detection; Chi square; Flow; Scan detection

Indexed keywords

ANOMALOUS ACTIVITY; ANOMALY DETECTION; ANOMALY DETECTION SYSTEMS; BEHAVIOR ANALYSIS; DETECTION MECHANISM; FLOW BASED; HIGH DETECTION RATE; INITIAL STAGES; INTRUSION DETECTION SYSTEMS; IP FLOW; MALICIOUS TRAFFIC; NETWORK TRAFFIC; PREVENTIVE ACTION; SECURITY MECHANISM;

EID: 77951151839     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IADCC.2010.5422996     Document Type: Conference Paper
Times cited : (18)

References (22)
  • 6
    • 77951185445 scopus 로고    scopus 로고
    • http://tools.ietf.org/html/rfc5102
  • 7
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly Detection: A survey
    • Article 15july
    • Varun chandola, Arindam banerjee and Preveen kumar, Anomaly Detection: A survey. ACM Comput. Surv. 41, 3 Article 15(july 2009)
    • (2009) ACM Comput. Surv. , vol.41 , Issue.3
    • Chandola, V.1    Banerjee, A.2    Kumar, P.3
  • 10
    • 0036122767 scopus 로고    scopus 로고
    • Robustness of Chi-Square and Canberra Diastance Metrics for Computer Intrusion Detection
    • Sayed Masun Emran, Nang YE,Robustness of Chi-Square and Canberra Diastance Metrics for Computer Intrusion Detection,Quality and Reliability Engineering International, 2002
    • (2002) Quality and Reliability Engineering International
    • Emran, S.M.1    Ye, N.2
  • 11
    • 0346960125 scopus 로고    scopus 로고
    • Scalable Chi-Squae Distance versus Conventional Statistical Distance for Process Monotoring with Uncorrelated Data Variables
    • Nong Ye, Connie M. Borror, Darshit Parmar, Scalable Chi-Squae Distance versus Conventional Statistical Distance for Process Monotoring with Uncorrelated Data Variables, Quality and Reliability Engineering International, 2003
    • (2003) Quality and Reliability Engineering International
    • Ye, N.1    Borror, C.M.2    Parmar, D.3
  • 13
    • 77951148635 scopus 로고    scopus 로고
    • Network traffic anomalies detection and identification with flow monitoring
    • May
    • HA Nguyen, T Van Nguyen, DI Kim, D Choi, Network traffic anomalies detection and identification with flow monitoring, WCON '08,May 2008
    • (2008) WCON '08
    • Nguyen, H.A.1    Van Nguyen, T.2    Kim, D.I.3    Choi, D.4
  • 18
    • 66949116854 scopus 로고    scopus 로고
    • Anomaly identification based on flow analysis, TENCON 2006
    • November
    • M. Z. Le The Quyen and Y. Tanaka. Anomaly identification based on flow analysis, TENCON 2006. 2006 IEEE Region 10 conference,pp. 1-4, November 2006
    • (2006) 2006 IEEE Region 10 Conference , pp. 1-4
    • Le, M.Z.1    Quyen, T.2    Tanaka, Y.3
  • 19
    • 77951198822 scopus 로고    scopus 로고
    • http://meteor.fokus.fraunhofer.de/libipfix/downloads.php
  • 20
    • 77951184911 scopus 로고    scopus 로고
    • http://www.snort.org
  • 21
    • 77951156767 scopus 로고    scopus 로고
    • http://nmap.org
  • 22
    • 77951147450 scopus 로고    scopus 로고
    • http://www.hping.org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.