메뉴 건너뛰기




Volumn 40, Issue 5, 2010, Pages 516-524

Toward credible evaluation of anomaly-based intrusion-detection methods

Author keywords

Anomaly detection; intrusion detection

Indexed keywords

ANOMALY DETECTION; ANOMALY-BASED INTRUSION DETECTION; COMMERCIAL APPLICATIONS; DETECTION METHODS; DETECTION TECHNIQUE; EXPERIMENTAL RESEARCH; FALSE ALARM RATE; HIGH DETECTION RATE; INTRUSION DETECTION SYSTEMS; RESEARCH COMMUNITIES;

EID: 77955847605     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2010.2048428     Document Type: Article
Times cited : (250)

References (31)
  • 3
    • 78650720508 scopus 로고    scopus 로고
    • The need for simulation in evaluating anomaly detectors
    • H. Ringberg, M. Roughan, and J. Rexford, "The need for simulation in evaluating anomaly detectors," SIGCOMM Comput. Commun. Rev., vol.38, no.1, pp. 55-59, 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.1 , pp. 55-59
    • Ringberg, H.1    Roughan, M.2    Rexford, J.3
  • 4
    • 84976699258 scopus 로고
    • ACM President's Letter: What is experimental computer science?"
    • P. J. Denning, "ACM President's Letter: What is experimental computer science?" Commun. ACM, vol.23, no.10, pp. 543-544, 1980.
    • (1980) Commun. ACM , vol.23 , Issue.10 , pp. 543-544
    • Denning, P.J.1
  • 5
    • 0029230328 scopus 로고
    • Experimental evaluation in computer science: A quantitative study
    • W. F. Tichy, P. Lukowicz, L. Prechelt, and E. A. Heinz, "Experimental evaluation in computer science: a quantitative study," J. Syst. Softw., vol.28, no.1, pp. 9-18, 1995.
    • (1995) J. Syst. Softw. , vol.28 , Issue.1 , pp. 9-18
    • Tichy, W.F.1    Lukowicz, P.2    Prechelt, L.3    Heinz, E.A.4
  • 6
    • 62349140167 scopus 로고    scopus 로고
    • Empirical evaluation in computer science research published by ACM
    • J. Wainer, C. N. Barsottini, D. Lacerda, and L. R. M. de Marco, "Empirical evaluation in computer science research published by ACM," Inf. Softw. Technol., vol.51, no.6, pp. 1081-1085, 2009.
    • (2009) Inf. Softw. Technol. , vol.51 , Issue.6 , pp. 1081-1085
    • Wainer, J.1    Barsottini, C.N.2    Lacerda, D.3    De Marco, L.R.M.4
  • 7
    • 0032074438 scopus 로고    scopus 로고
    • Experimental models for validating technology
    • M. V. Zelkowitz and D. R. Wallace, "Experimental models for validating technology," Computer, vol.31, no.5, pp. 23-31, 1998.
    • (1998) Computer , vol.31 , Issue.5 , pp. 23-31
    • Zelkowitz, M.V.1    Wallace, D.R.2
  • 8
    • 61349185752 scopus 로고    scopus 로고
    • An update to experimental models for validating computer technology
    • M. V. Zelkowitz, "An update to experimental models for validating computer technology," J. Syst. Softw., vol.82, no.3, pp. 373-376, 2009.
    • (2009) J. Syst. Softw. , vol.82 , Issue.3 , pp. 373-376
    • Zelkowitz, M.V.1
  • 10
    • 34247117411 scopus 로고    scopus 로고
    • On the success of empirical studies in the international conference on software engineering
    • New York, NY: ACM
    • C. Zannier, G. Melnik, and F. Maurer, "On the success of empirical studies in the international conference on software engineering," in Proc. 28th Int. Conf. Softw. Eng. (ICSE), New York, NY: ACM, 2006, pp. 341-350.
    • (2006) Proc. 28th Int. Conf. Softw. Eng. (ICSE) , pp. 341-350
    • Zannier, C.1    Melnik, G.2    Maurer, F.3
  • 11
    • 0036152263 scopus 로고    scopus 로고
    • On credibility of simulation studies of telecommunication networks
    • DOI 10.1109/35.978060
    • K. Pawlikowski, H.-D. Jeong, and J.-S. R., "On credibility of simulation studies of telecommunication networks," IEEE Commun. Mag., vol.40, no.1, pp. 132-139, Jan. 2001. (Pubitemid 34110003)
    • (2002) IEEE Communications Magazine , vol.40 , Issue.1 , pp. 132-139
    • Pawlikowski, K.1    Jeong, H.-D.J.2    Lee, J.-S.R.3
  • 13
    • 77955852185 scopus 로고    scopus 로고
    • Jan. [Online]. Available
    • Estimated Venue Impact Factors. (2009, Jan.). [Online]. Available: http://citeseerx.ist.psu.edu/stats/venues
    • (2009) Estimated Venue Impact Factors
  • 15
    • 0003993827 scopus 로고    scopus 로고
    • MIT Lincoln Labs, [Online], Feb
    • MIT Lincoln Labs. (2008, Feb.). DARPA intrusion detection evaluation [Online]. Available: http://www.ll.mit.edu/mission/communications/ist/corpora/ ideval/index.html
    • (2008) DARPA Intrusion Detection Evaluation
  • 16
    • 77955852537 scopus 로고    scopus 로고
    • KDD Cup 1999 (Oct.) [Online] Available:
    • KDD Cup 1999. (2008, Oct.) [Online]. Available: http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
    • (2008)
  • 18
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection
    • Berlin, Germany: Springer-Verlag
    • M. V. Mahoney and P. K. Chan, "An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection," in Proc. 6th Int. Symp. Recent Adv. Intrusion Detection. Berlin, Germany: Springer-Verlag, 2003, pp. 220-237.
    • (2003) Proc. 6th Int. Symp. Recent Adv. Intrusion Detection , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 19
    • 77955848587 scopus 로고    scopus 로고
    • The Internet Traffic Archive Apr. [Online]. Available
    • The Internet Traffic Archive. (2009, Apr.). [Online]. Available: http://ita.ee.lbl.gov/
    • (2009)
  • 20
    • 84943383590 scopus 로고    scopus 로고
    • Identifying important features for intrusion detection using support vector machines and neural networks
    • Washington, DC: IEEE Comput. Soc.
    • A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Proc. Symp. Appl. Internet (SAINT). Washington, DC: IEEE Comput. Soc., 2003, pp. 209-216.
    • (2003) Proc. Symp. Appl. Internet (SAINT) , pp. 209-216
    • Sung, A.H.1    Mukkamala, S.2
  • 21
    • 33144477616 scopus 로고    scopus 로고
    • Inverting sampled traffic
    • Jan.
    • N. Hohn and D. Veitch, "Inverting sampled traffic," IEEE/ACM Trans. Netw., vol.14, no.1, pp. 68-80, Jan. 2006.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.1 , pp. 68-80
    • Hohn, N.1    Veitch, D.2
  • 23
    • 63049099280 scopus 로고    scopus 로고
    • Towards optimal sampling for flow size estimation
    • New York, NY: ACM
    • P. Tune and D. Veitch, "Towards optimal sampling for flow size estimation," in Proc. 8th ACM SIGCOMM Conf. Internet Meas. (IMC). New York, NY: ACM, 2008, pp. 243-256.
    • (2008) Proc. 8th ACM SIGCOMM Conf. Internet Meas. (IMC) , pp. 243-256
    • Tune, P.1    Veitch, D.2
  • 24
    • 33646179175 scopus 로고    scopus 로고
    • Internet intrusions: Global characteristics and prevalence
    • V. Yegneswaran, P. Barford, and J. Ullrich, "Internet intrusions: global characteristics and prevalence," SIGMETRICS Perform. Eval. Rev., vol.31, no.1, pp. 138-147, 2003.
    • (2003) SIGMETRICS Perform. Eval. Rev. , vol.31 , Issue.1 , pp. 138-147
    • Yegneswaran, V.1    Barford, P.2    Ullrich, J.3
  • 25
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Profiling internet backbone traffic: behavior models and applications," SIGCOMM Comput. Commun. Rev., vol.35, no.4, pp. 169-180, 2005.
    • (2005) SIGCOMM Comput. Commun. Rev. , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 28
    • 33751035185 scopus 로고    scopus 로고
    • A framework for the evaluation of intrusion detection systems
    • Washington, DC: IEEE Comput. Soc.
    • A. A. Cárdenas, J. S. Baras, and K. Seamon, "A framework for the evaluation of intrusion detection systems," in Proc. 2006 IEEE Symp. Security Privacy (SP). Washington, DC: IEEE Comput. Soc., 2006, pp. 63-77.
    • (2006) Proc. 2006 IEEE Symp. Security Privacy (SP) , pp. 63-77
    • Cárdenas, A.A.1    Baras, J.S.2    Seamon, K.3
  • 30
    • 0033281215 scopus 로고    scopus 로고
    • The base-rate fallacy and its implications for the difficulty of intrusion detection
    • New York, NY: ACM
    • S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in Proc. 6th ACM Conf. Comput. Commun. Security (CCS), New York, NY: ACM, 1999, pp. 1-7.
    • (1999) Proc. 6th ACM Conf. Comput. Commun. Security (CCS) , pp. 1-7
    • Axelsson, S.1
  • 31
    • 19544384880 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection
    • presented at the San Francisco, CA
    • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," presented at the 3rd SIAM Int. Conf. Data Mining, San Francisco, CA, 2003.
    • (2003) 3rd SIAM Int. Conf. Data Mining
    • Lazarevic, A.1    Ertoz, L.2    Kumar, V.3    Ozgur, A.4    Srivastava, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.