메뉴 건너뛰기




Volumn , Issue , 2008, Pages 136-147

Principled reasoning and practical applications of alert fusion in intrusion detection systems

Author keywords

Alert fusion; IDS ensemble; Intrusion detection; Likelihood ratio test; ROC curve

Indexed keywords

DATA SETS; DECISION-THEORETIC; EMPIRICAL STUDIES; FOLLOWING PROBLEM; FUSION TECHNIQUES; INTRUSION DETECTION SYSTEMS; INTRUSION DETECTORS; LIKELIHOOD RATIO TESTS; MAJORITY VOTING; MULTIPLE DETECTORS; ROC CURVES; WEIGHTED VOTING;

EID: 77952384694     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368332     Document Type: Conference Paper
Times cited : (35)

References (52)
  • 1
    • 77952345625 scopus 로고    scopus 로고
    • Kdd cup, data
    • Kdd cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html, 2005.
    • (1999)
  • 3
    • 12844261665 scopus 로고    scopus 로고
    • Measuring the risk-based value of it security solutions
    • Nov.-Dec
    • Anish Arora, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, and Rahul Telang. Measuring the risk-based value of it security solutions. IT Professional, 6 (6):35-42, Nov.-Dec. 2004.
    • (2004) IT Professional , vol.6 , Issue.6 , pp. 35-42
    • Arora, A.1    Hall, D.2    Pinto, C.A.3    Ramsey, D.4    Telang, R.5
  • 4
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • November
    • S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
    • (1999) Proceedings of ACM CCS'1999
    • Axelsson, S.1
  • 6
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • Tim Bass. Intrusion detection systems and multisensor data fusion. Commun. ACM, 43 (4):99-105, 2000.
    • (2000) Commun. ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1
  • 10
    • 4944252600 scopus 로고    scopus 로고
    • Chih-Chung Chang and Chih-Jen Lin, Software available at
    • Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
    • (2001) LIBSVM: A Library for Support Vector Machines
  • 25
    • 0004283231 scopus 로고    scopus 로고
    • Michael I. Jordan, editor, MIT Press, Cambridge, MA, USA
    • Michael I. Jordan, editor. Learning in graphical models. MIT Press, Cambridge, MA, USA, 1999.
    • (1999) Learning in Graphical Models
  • 27
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • DOI 10.1016/j.comnet.2005.01.009, PII S1389128605000083, Web Traffic
    • C. Kruegel, G. Vigna, and W. Robertson. A Multi-model Approach to the Detection of Web-based Attacks. Computer Networks, 48 (5):717-738, August 2005. (Pubitemid 40684159)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 717-738
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 31
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3 (4): p. 227-261, 2000.
    • (2000) ACM Transactions on Information and System Security (TISSEC) , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 34
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • November
    • M. Mahoney. Network traffic anomaly detection based on packet bytes. In Proceedings of 18th ACM Symp. on Applied Computing, pages 346-350, November 2003.
    • (2003) Proceedings of 18th ACM Symp. on Applied Computing , pp. 346-350
    • Mahoney, M.1
  • 36
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory
    • November
    • John McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3 (4), November 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4
    • McHugh, J.1
  • 43
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • Martin Roesch. Snort: Lightweight intrusion detection for networks. In LISA, pages 229-238, 1999.
    • (1999) LISA , pp. 229-238
    • Roesch, M.1
  • 46
    • 33845536393 scopus 로고    scopus 로고
    • COTS diversity intrusion detection and application to web servers
    • September
    • Eric Totel, Frederic Majorczyk, and Ludovic Me. COTS diversity intrusion detection and application to web servers. In Proceedings of RAID'2005, September 2005.
    • (2005) Proceedings of RAID'2005
    • Totel, E.1    Majorczyk, F.2    Me, L.3
  • 50
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • September
    • Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'2004, September 2004.
    • (2004) Proceedings of RAID'2004
    • Wang, K.1    Stolfo, S.J.2
  • 52
    • 0026860706 scopus 로고
    • Methods of combining multiple classifiers and their applications to handwriting recognition
    • L. Xu, A. Krzyzak, and CY Suen. Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Trans. Systems Man Cybernet, 22 (3):418-435, 1992.
    • (1992) IEEE Trans. Systems Man Cybernet , vol.22 , Issue.3 , pp. 418-435
    • Xu, L.1    Krzyzak, A.2    Cy, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.