메뉴 건너뛰기




Volumn 9, Issue , 2006, Pages 311-329

Principal component-based anomaly detection scheme

Author keywords

Anomaly detection; data mining; intrusion detection; outliers; principal component analysis; principal component classifier

Indexed keywords


EID: 78049278861     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/11539827-18     Document Type: Conference Paper
Times cited : (30)

References (25)
  • 6
    • 33746426241 scopus 로고    scopus 로고
    • Robustness of Canberra metric in computer intrusion detection
    • United States Military Academy, West Point, New York
    • Emran SM, Ye N (2001) Robustness of Canberra metric in computer intrusion detection. In: Proc. of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, pp 80-84
    • (2001) Proc. of the IEEE Workshop on Information Assurance and Security , pp. 80-84
    • Emran, S.M.1    Ye, N.2
  • 7
    • 0002954125 scopus 로고
    • Robust estimates, residuals and outlier detection with multiresponse data
    • Gnanadesikan R, Kettenring JR (1972) Robust estimates, residuals and outlier detection with multiresponse data. Biometrics, 28:81-124
    • (1972) Biometrics , vol.28 , pp. 81-124
    • Gnanadesikan, R.1    Kettenring, J.R.2
  • 8
    • 0009928479 scopus 로고
    • The detection of errors in multivariate data using principal components
    • Hawkins DM (1974) The detection of errors in multivariate data using principal components. Journal of the American Statistical Association, vol 69, no 346:340-344
    • (1974) Journal of the American Statistical Association , vol.69 , Issue.346 , pp. 340-344
    • Hawkins, D.M.1
  • 9
    • 0003478316 scopus 로고
    • The architecture of a network level intrusion detection system
    • Computer Science Department, University of New Mexico
    • Heady R, Luger G, Maccabe A, Servilla M (1990) The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico
    • (1990) Technical Report
    • Heady, R.1    Luger, G.2    Maccabe, A.3    Servilla, M.4
  • 16
    • 78049254025 scopus 로고    scopus 로고
    • KDD Cup 1999 Data, Available on
    • KDD Cup 1999 Data, Available on: http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html
  • 18
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3:227-261
    • (2000) ACM Transactions on Information and System Security , vol.3 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 20
    • 0142063407 scopus 로고    scopus 로고
    • Novelty detection: A review, Part 1: Statistical approaches
    • Markou M, Singh S (2003) Novelty detection: A review, Part 1: Statistical approaches. Signal Processing, 83, 12:2481-2497
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2481-2497
    • Markou, M.1    Singh, S.2
  • 21
    • 0142126712 scopus 로고    scopus 로고
    • Novelty detection: A review, Part 2: Neural network-based approaches
    • Markou M, Singh S (2003) Novelty detection: A review, Part 2: Neural network-based approaches. Signal Processing, 83, 12:2499-2521
    • (2003) Signal Processing , vol.83 , Issue.12 , pp. 2499-2521
    • Markou, M.1    Singh, S.2
  • 24
    • 0035271352 scopus 로고    scopus 로고
    • An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
    • Ye N, Chen Q (2001) An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Eng. Int'l, 17:105-112
    • (2001) Quality and Reliability Eng. Int'l , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 25
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • Ye N, Emran SM, Chen Q, Vilbert S (2002) Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers, 51:810-820
    • (2002) IEEE Transactions on Computers , vol.51 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.