메뉴 건너뛰기




Volumn , Issue , 2010, Pages 305-316

Outside the closed world: On using machine learning for network intrusion detection

Author keywords

Anomaly detection; Intrusion detection; Machine learning; Network security

Indexed keywords

ACADEMIC RESEARCH; ANOMALY DETECTION; IN-NETWORK; INTRUSION DETECTION APPROACHES; MACHINE LEARNING COMMUNITIES; MACHINE-LEARNING; NETWORK INTRUSION DETECTION; OTHER APPLICATIONS;

EID: 77955209381     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.25     Document Type: Conference Paper
Times cited : (1240)

References (66)
  • 1
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach," in Proc. IEEE Symposium on Security and Privacy, 1997.
    • (1997) Proc. IEEE Symposium on Security and Privacy
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 3
    • 0037252945 scopus 로고    scopus 로고
    • Amazon.com recommendations: Item-to-Item collaborative filtering
    • G. Linden, B. Smith, and J. York, "Amazon.com Recommendations: Item-to-Item Collaborative Filtering," IEEE Internet Computing, vol. 7, no. 1, pp. 76-80, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.1 , pp. 76-80
    • Linden, G.1    Smith, B.2    York, J.3
  • 7
    • 22944469345 scopus 로고    scopus 로고
    • The alignment template approach to statistical machine translation
    • F. J. Och and H. Ney, "The Alignment Template Approach to Statistical Machine Translation," Comput. Linguist, vol. 30, no. 4, pp. 411-449, 2004.
    • (2004) Comput. Linguist , vol.30 , Issue.4 , pp. 411-449
    • Och, F.J.1    Ney, H.2
  • 10
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • H. S. Javitz and A. Valdes, "The NIDES Statistical Component: Description and Justification," SRI International, Tech. Rep., 1993.
    • (1993) SRI International, Tech. Rep.
    • Javitz, H.S.1    Valdes, A.2
  • 17
    • 0042421807 scopus 로고    scopus 로고
    • Statistical fraud detection: A review
    • R. J. Bolton and D. J. Hand, "Statistical Fraud Detection: A Review," Statistical Science, vol. 17, no. 3, 2002.
    • (2002) Statistical Science , vol.17 , Issue.3
    • Bolton, R.J.1    Hand, D.J.2
  • 19
    • 77955201954 scopus 로고    scopus 로고
    • "Peakflow SP," http://www.arbornetworks.com/en/ peakflow-sp.html.
  • 20
    • 77955218024 scopus 로고    scopus 로고
    • "StealthWatch," http://www.lancope.com/products/.
    • StealthWatch
  • 24
    • 77955182553 scopus 로고    scopus 로고
    • Make data useful
    • Stanford University
    • "Make Data Useful," Greg Linden, Data Mining Seminar, Stanford University, 2006. http://glinden.blogspot.com/2006/ 12/slides-from-my-talk-at- stanford.htm%1.
    • (2006) Data Mining Seminar
  • 30
  • 31
    • 77955187399 scopus 로고    scopus 로고
    • Lawrence Berkeley National Laboratory, via personal communication
    • Jim Mellander, Lawrence Berkeley National Laboratory, via personal communication, 2009.
    • (2009)
    • Mellander, J.1
  • 32
    • 0031078972 scopus 로고    scopus 로고
    • Self-similarity through high-variability: Statistical analysis of ethernet LAN traffic at the source level
    • W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson, "Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level," IEEE/ACM Transactions on Networking, vol. 5, no. 1, 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.1
    • Willinger, W.1    Taqqu, M.S.2    Sherman, R.3    Wilson, D.V.4
  • 33
    • 0001817861 scopus 로고    scopus 로고
    • Data networks as cascades: Investigating the multifractal nature of internet WAN traffic
    • A. Feldmann, A. C. Gilbert, and W. Willinger, "Data Networks As Cascades: Investigating the Multifractal Nature of Internet WAN Traffic," in Proc. ACM SIGCOMM, 1998.
    • (1998) Proc. ACM SIGCOMM
    • Feldmann, A.1    Gilbert, A.C.2    Willinger, W.3
  • 34
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 42
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • October
    • R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-line Intrusion Detection Evaluation," Computer Networks, vol. 34, no. 4, pp. 579-595, October 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 43
    • 77955190035 scopus 로고    scopus 로고
    • "KDD Cup Data," http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
  • 44
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratories
    • November
    • J. McHugh, "Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratories," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, November 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 45
    • 10844237614 scopus 로고    scopus 로고
    • An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
    • M. V. Mahoney and P. K. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection," in Proc. Recent Advances in Intrusion Detection, 2003.
    • (2003) Proc. Recent Advances in Intrusion Detection
    • Mahoney, M.V.1    Chan, P.K.2
  • 46
    • 77955182552 scopus 로고    scopus 로고
    • "ClarkNet-HTTP," http://ita.ee.lbl.gov/html/contrib/ ClarkNet-HTTP.html.
  • 47
    • 77955203132 scopus 로고    scopus 로고
    • via personal communication
    • Martin Arlitt, via personal communication, 2008.
    • (2008)
    • Arlitt, M.1
  • 49
    • 77955205390 scopus 로고    scopus 로고
    • "tcpdpriv," http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.
  • 52
    • 77955201686 scopus 로고    scopus 로고
    • "The Internet Traffic Archive (ITA)," http://ita.ee.lbl.gov.
  • 53
    • 77955187398 scopus 로고    scopus 로고
    • "PREDICT," http://www.predict.org.
  • 56
    • 84880858814 scopus 로고    scopus 로고
    • Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
    • K. M. Tan and R. A. Maxion, ""Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector," in Proc. IEEE Symposium on Security and Privacy, 2002.
    • (2002) Proc. IEEE Symposium on Security and Privacy
    • Tan, K.M.1    Maxion, R.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.