메뉴 건너뛰기




Volumn 20, Issue 5, 2010, Pages 271-293

A scalable, efficient and informative approach for anomaly-based intrusion detection systems: Theory and practice

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS RESULTS; ANOMALY DETECTION; ANOMALY-BASED INTRUSION DETECTION; COUNT-MIN SKETCH; DESCRIPTORS; FLASH CROWD; FLOW SAMPLING; IN-CELL; NETWORK SCANNING; NEW APPROACHES; ONLINE IMPLEMENTATION; PORT SCANNING; RANDOM AGGREGATION; REDUCTION PHASE; RESPONSE TIME; REVERSIBLE SKETCHES; SEQUENTIAL CHANGES; SHORT-LIVED FLOW; THEORY AND PRACTICE; TRAFFIC TRACES;

EID: 77956377864     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.748     Document Type: Article
Times cited : (39)

References (59)
  • 2
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks 1999;31%(23-24):2435-2463.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 4
    • 70450206702 scopus 로고    scopus 로고
    • Specification of the IP flow information export (IPFIX) Protocol for the exchange of IP traffic flow information
    • January
    • Claise B, Bryant S, Sadasivan G, Leinen S, Dietz T. Specification of the IP Flow Information Export (IPFIX) Protocol for the exchange of IP traffic flow information. RFC 5101, January 2008.
    • (2008) RFC 5101
    • Claise, B.1    Bryant, S.2    Sadasivan, G.3    Leinen, S.4    Dietz, T.5
  • 8
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Ye N, Vilbert S, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;51(1):75-82.
    • (2003) IEEE Transactions on Reliability , vol.51 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3
  • 12
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary: The Count-Min sketch and its applications
    • Cormode G, Muthukrishnan S. An improved data stream summary: the Count-Min sketch and its applications. Journal of Algorithms 2005;55(1):58-75.
    • (2005) Journal of Algorithms , vol.55 , Issue.1 , pp. 58-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 13
    • 33746983029 scopus 로고    scopus 로고
    • Detection of intrusion in information systems by sequential change-point methods
    • Tartakovsky A, Rozovskii B, Blazek R, Kim H. Detection of intrusion in information systems by sequential change-point methods. Statistical Methodology 2006;3(3):252-340.
    • (2006) Statistical Methodology , vol.3 , Issue.3 , pp. 252-340
    • Tartakovsky, A.1    Rozovskii, B.2    Blazek, R.3    Kim, H.4
  • 19
    • 84954358597 scopus 로고    scopus 로고
    • Traffic flooding attack detection with SNMP MIB using SVM
    • Yu J, Lee H, Kim M-S, Park D. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications 2008;31(17):4212-4219.
    • (2008) Computer Communications , vol.31 , Issue.17 , pp. 4212-4219
    • Yu, J.1    Lee, H.2    Kim, M.-S.3    Park, D.4
  • 45
    • 65249118227 scopus 로고    scopus 로고
    • Network anomaly detection and classification via opportunistic sampling
    • Androulidakis G, Chatzigiannakis V, Papavassiliou S. Network anomaly detection and classification via opportunistic sampling. IEEE Network 2009;23(1):6-12.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 6-12
    • Androulidakis, G.1    Chatzigiannakis, V.2    Papavassiliou, S.3
  • 46
    • 42149164334 scopus 로고    scopus 로고
    • Improving network anomaly detection via selective flow-based sampling
    • Androulidakis G, Papavassiliou S. Improving network anomaly detection via selective flow-based sampling. IET Communications Journal 2008;2(3):399-409.
    • (2008) IET Communications Journal , vol.2 , Issue.3 , pp. 399-409
    • Androulidakis, G.1    Papavassiliou, S.2
  • 48
    • 8344272783 scopus 로고    scopus 로고
    • What's new: Finding significant differences in network data streams
    • Cormode G, Muthukrishnan S. What's new: finding significant differences in network data streams. In Proceedings of IEEE Infocom, 2004;1534-1545.
    • (2004) Proceedings of IEEE Infocom , pp. 1534-1545
    • Cormode, G.1    Muthukrishnan, S.2
  • 53
    • 72349083803 scopus 로고    scopus 로고
    • Detection and localization of change points in high-dimensional network traffic data
    • Levy-Leduc C., Roueff F. Detection and localization of change points in high-dimensional network traffic data. Annals of Applied Statistics, 2009;3(2):637-662.
    • (2009) Annals of Applied Statistics , vol.3 , Issue.2 , pp. 637-662
    • Levy-Leduc, C.1    Roueff, F.2
  • 56
    • 77956388996 scopus 로고    scopus 로고
    • Optimized RC4 code. Available:, 9 July
    • Optimized RC4 code. Available: http://www.zengl.net/freeswan/[9 July 2010].
    • (2010)
  • 57
    • 77956387838 scopus 로고    scopus 로고
    • Count-Min sketch source code. Available:, 9 July
    • Count-Min sketch source code. Available: http://www.cs.rutgers.edu/muthu/ massdal-code-index.html [9 July 2010].
    • (2010)
  • 58
    • 77956382996 scopus 로고    scopus 로고
    • MAWI working group traffic archive
    • MAWI working group traffic archive. http://mawi.wide.ad.jp/mawi/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.