메뉴 건너뛰기




Volumn 40, Issue 3, 2010, Pages 597-611

Maintaining defender's reputation in anomaly detection against insider attacks

Author keywords

Anomaly detection; Game theory; Insider attack

Indexed keywords

ANOMALY DETECTION; FALSE POSITIVE; INSIDER ATTACK; NOVEL ALGORITHM; PERFORMANCE EVALUATION;

EID: 77952581914     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2009.2033564     Document Type: Article
Times cited : (33)

References (32)
  • 2
    • 20444471202 scopus 로고    scopus 로고
    • Statistical profiling and visualization for detection of malicious insider attacks on computer networks
    • J. B. Colombe and G. Stephens, "Statistical profiling and visualization for detection of malicious insider attacks on computer networks, " in Proc. ACM Workshop Visualization Data Mining Comput. Security, 2004, pp. 138-142.
    • (2004) Proc. ACM Workshop Visualization Data Mining Comput. Security , pp. 138-142
    • Colombe, J.B.1    Stephens, G.2
  • 3
  • 4
    • 16644384919 scopus 로고    scopus 로고
    • Incentive-based modeling and inference of attacker intent, objectives, and strategies
    • Feb
    • P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies, " ACM Trans. Inf. Syst. Secur., vol. 8, no. 1, pp. 78-118, Feb. 2005.
    • (2005) ACM Trans. Inf. Syst. Secur. , vol.8 , Issue.1 , pp. 78-118
    • Liu, P.1    Zang, W.2    Yu, M.3
  • 5
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • Feb
    • J. Xu and W. Lee, "Sustaining availability of web services under distributed denial of service attacks, " IEEE Trans. Comput., vol. 52, no. 2, pp. 195-208, Feb. 2003.
    • (2003) IEEE Trans. Comput. , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 6
    • 0038223766 scopus 로고    scopus 로고
    • Using information security as a response to competitor analysis systems
    • Sep
    • L. A. Gordon and M. P. Loeb, "Using information security as a response to competitor analysis systems, " Commun. ACM, vol. 44, no. 9, pp. 70-75, Sep. 2001.
    • (2001) Commun. ACM , vol.44 , Issue.9 , pp. 70-75
    • Gordon, L.A.1    Loeb, M.P.2
  • 8
    • 33947628137 scopus 로고    scopus 로고
    • Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
    • May
    • W. Yu and K. J. R. Liu, "Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks, " IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 459-473, May 2007.
    • (2007) IEEE Trans. Mobile Comput. , vol.6 , Issue.5 , pp. 459-473
    • Yu, W.1    Liu, K.J.R.2
  • 9
    • 14344257107 scopus 로고    scopus 로고
    • A game theoretic analysis of intrusion detection in access control systems
    • T. Alpcan and T. Basar, "A game theoretic analysis of intrusion detection in access control systems, " in Proc. 43rd IEEE Conf. Decision Control, 2004, pp. 1568-1573.
    • (2004) Proc. 43rd IEEE Conf. Decision Control , pp. 1568-1573
    • Alpcan, T.1    Basar, T.2
  • 10
    • 60649107168 scopus 로고    scopus 로고
    • A Bayesian game approach for intrusion detection in wireless ad hoc networks
    • Article
    • Y. Liu, C. Comaniciu, and H. Man, "A Bayesian game approach for intrusion detection in wireless ad hoc networks, " in Proc. Workshop Game Theory Commun. Netw., 2006, Article No. 4.
    • (2006) Proc. Workshop Game Theory Commun. Netw. , Issue.4
    • Liu, Y.1    Comaniciu, C.2    Man, H.3
  • 12
    • 33745599368 scopus 로고    scopus 로고
    • Distributed privacy preserving information sharing
    • N. Zhang and W. Zhao, "Distributed privacy preserving information sharing, " in Proc. VLDB, 2005, pp. 889-900.
    • (2005) Proc. VLDB , pp. 889-900
    • Zhang, N.1    Zhao, W.2
  • 14
    • 0000572547 scopus 로고
    • Reputation and equilibrium selection in games with a patient player
    • D. Fudenberg and D. K. Levine, "Reputation and equilibrium selection in games with a patient player, " Econometrica, vol. 57, no. 4, pp. 759-778, 1989.
    • (1989) Econometrica , vol.57 , Issue.4 , pp. 759-778
    • Fudenberg, D.1    Levine, D.K.2
  • 16
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection, " in Proc. USENIX SECURITY, 2004, pp. 271-286.
    • (2004) Proc. USENIX SECURITY , pp. 271-286
    • Kim, H.1    Karp, B.2
  • 17
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies, " in Proc. SIGCOMM, 2004, pp. 219-230.
    • (2004) Proc. SIGCOMM , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 18
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection, " in Proc. CCS, 1999, pp. 1-7.
    • (1999) Proc. CCS , pp. 1-7
    • Axelsson, S.1
  • 21
    • 27544447707 scopus 로고    scopus 로고
    • Towards a theory of insider threat assessment
    • R. Chinchani, A. Iyer, H. Q. Ngo, and S. Upadhyaya, "Towards a theory of insider threat assessment, " in Proc. DSN, 2005, pp. 108-117.
    • (2005) Proc. DSN , pp. 108-117
    • Chinchani, R.1    Iyer, A.2    Ngo, H.Q.3    Upadhyaya, S.4
  • 22
    • 10044278199 scopus 로고    scopus 로고
    • Weak models for insider threat detection
    • P. Thompson, "Weak models for insider threat detection, " Proc. SPIE, pp. 40-48, 2004.
    • (2004) Proc. SPIE , pp. 40-48
    • Thompson, P.1
  • 23
    • 84944727480 scopus 로고    scopus 로고
    • Honeypots: Catching the insider threat
    • L. Spitzner, "Honeypots: Catching the insider threat, " in Proc. ACSAC, 2003, pp. 170-179.
    • (2003) Proc. ACSAC , pp. 170-179
    • Spitzner, L.1
  • 24
    • 21644453410 scopus 로고    scopus 로고
    • Security policies to mitigate insider threat in the document control domain
    • S. Pramanik, V. Sankaranarayanan, and S. Upadhyaya, "Security policies to mitigate insider threat in the document control domain, " in Proc. ACSAC, 2004, pp. 304-313.
    • (2004) Proc. ACSAC , pp. 304-313
    • Pramanik, S.1    Sankaranarayanan, V.2    Upadhyaya, S.3
  • 25
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • P. Ning and K. Sun, "How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols, " Ad Hoc Netw., vol. 3, no. 6, pp. 795-819, 2005.
    • (2005) Ad Hoc Netw. , vol.3 , Issue.6 , pp. 795-819
    • Ning, P.1    Sun, K.2
  • 26
    • 33846303234 scopus 로고    scopus 로고
    • Detecting intraenterprise scanning worms based on address resolution
    • D. Whyte, P. C. Van Oorschot, and E. Kranakis, "Detecting intraenterprise scanning worms based on address resolution, " in Proc. ACSAC, 2005, pp. 371-380.
    • (2005) Proc. ACSAC , pp. 371-380
    • Whyte, D.1    Van Oorschot, P.C.2    Kranakis, E.3
  • 27
    • 14844293542 scopus 로고    scopus 로고
    • Game strategies in network security
    • K. Lye and J. M. Wing, "Game strategies in network security, " Int. J. Inf. Secur., vol. 4, no. 1/2, pp. 71-86, 2005.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.1-2 , pp. 71-86
    • Lye, K.1    Wing, J.M.2
  • 30
    • 3142738238 scopus 로고    scopus 로고
    • PeerTrust: Supporting reputation-based trust in peer-to-peer communities
    • Jul
    • L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust in peer-to-peer communities, " IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 443-459, Jul. 2004.
    • (2004) IEEE Trans. Knowl. Data Eng. , vol.16 , Issue.7 , pp. 443-459
    • Xiong, L.1    Liu, L.2
  • 31
    • 14844315770 scopus 로고    scopus 로고
    • Reputation-based framework for high integrity sensor networks
    • S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks, " in Proc. SASN, 2004, pp. 66-77.
    • (2004) Proc. SASN , pp. 66-77
    • Ganeriwal, S.1    Srivastava, M.B.2
  • 32
    • 0000732722 scopus 로고
    • Reputation in the simultaneous play of multiple opponents
    • Oct
    • D. Fudenberg and D. M. Kreps, "Reputation in the simultaneous play of multiple opponents, " Rev. Econ. Stud., vol. 54, no. 4, pp. 541-568, Oct. 1987.
    • (1987) Rev. Econ. Stud. , vol.54 , Issue.4 , pp. 541-568
    • Fudenberg, D.1    Kreps, D.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.