메뉴 건너뛰기




Volumn 4, Issue 3, 2007, Pages 292-305

An observation-centric analysis on the modeling of anomaly-based intrusion detection

Author keywords

Anomaly detection; Computer security; Information security; Intrusion detection; Misuse detection

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION MODELS; ANOMALY DETECTOR; ANOMALY-BASED INTRUSION DETECTION; BLIND SPOTS; COMPUTATIONAL COSTS; DETECTION COVERAGE; EXISTING PROBLEMS; FORMAL ANALYSIS; KEYPOINTS; MISUSE DETECTION; OBSERVATION-CENTRIC ANALYSIS; OBSERVED SAMPLES; OPERATING ENVIRONMENT; OPERATIONAL CAPABILITIES; STATISTICAL FRAMEWORK;

EID: 78049530653     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (31)
  • 3
    • 21844476566 scopus 로고    scopus 로고
    • A performance comparison of different back propagation neural networks methods in computer network intrusion detection
    • Jan.&Apr
    • V. N. P. Dao and V. R. Vemuri, "A performance comparison of different back propagation neural networks methods in computer network intrusion detection," Differential Equations and Dynamical Systems, vol. 10, no. 1&2, pp. 201-21, Jan.&Apr., 2002.
    • (2002) Differential Equations and Dynamical Systems , vol.10 , Issue.1-2 , pp. 201-221
    • Dao, V.N.P.1    Vemuri, V.R.2
  • 4
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • Y. D. Yan and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models,' Pttern Recognition, vol. 36, pp. 229-243, 2003.
    • (2003) Pttern Recognition , vol.36 , pp. 229-243
    • Yan, Y.D.1    Ding, Y.2
  • 7
    • 0027668428 scopus 로고
    • Statistical foundataions of audit trail analysis for the detection of computer misuse
    • Sep
    • P. Helman and G. Liepins, "Statistical foundataions of audit trail analysis for the detection of computer misuse," IEEE Transaction on Software Engineering, vol. 19, no. 9, Sep. 1993.
    • (1993) IEEE Transaction on Software Engineering , vol.19 , Issue.9
    • Helman, P.1    Liepins, G.2
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, S. Forrest, A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 11
    • 4644374039 scopus 로고    scopus 로고
    • Optimality of universal Bayesian sequence prediction for general loss and alphabet
    • M. Hutter, "Optimality of universal Bayesian sequence prediction for general loss and alphabet," Journal of Machine Learning Research, vol. 4, pp. 971-1000, 2003.
    • (2003) Journal of Machine Learning Research , vol.4 , pp. 971-1000
    • Hutter, M.1
  • 12
    • 0037400054 scopus 로고    scopus 로고
    • An empirical study of two approaches to sequence learning for anomaly detection
    • T. Lane, and C. E. Brodley, "An empirical study of two approaches to sequence learning for anomaly detection," Machine Learning, vol. 51, pp. 73-107, 2003.
    • (2003) Machine Learning , vol.51 , pp. 73-107
    • Lane, T.1    Brodley, C.E.2
  • 14
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Los Alamitos, Oakland, California, 14- 16 May
    • W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 130-143, Los Alamitos, Oakland, California, 14- 16 May, 2001.
    • (2001) IEEE Symposium on Security and Privacy, IEEE Computer Society Press , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 15
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-Nearest neighbor classifier for intrusion detection
    • Oct
    • Y. Liao and V. R. Vemuri, "Use of K-Nearest neighbor classifier for intrusion detection," Computers&Security, vol. 21, no. 5, pp. 439-448, Oct. 2002.
    • (2002) Computers&Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 17
    • 0035481772 scopus 로고    scopus 로고
    • Modeling heterogeneous network traffic in wavelet domain
    • Oct
    • S. Ma, and C. Ji, "Modeling heterogeneous network traffic in wavelet domain," IEEE/ACM Transactions On Networking, vol. 9, no. 5, pp. 634-649, Oct. 2001.
    • (2001) IEEE/ACM Transactions On Networking , vol.9 , Issue.5 , pp. 634-649
    • Ma, S.1    Ji, C.2
  • 18
  • 20
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincolnlaboratory
    • Nov
    • J. Mchugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincolnlaboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, Nov. 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • Mchugh, J.1
  • 21
    • 84874797794 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory
    • MIT Lincoln Laboratory, http://www.ll.mit.edu/IST/ideval/data/dataindex.html.
  • 25
    • 84958984156 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection system using common exploits
    • Springer-Verlag
    • K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," RAID 2002, LNCS 2516, pp. 54-73, Springer-Verlag, 2002.
    • (2002) RAID 2002, LNCS 2516 , pp. 54-73
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 28
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for hostbased intrusion detection
    • July
    • N. Ye, S. M. Emran, Q. Chen, and S. Vilber, "Multivariate statistical analysis of audit trails for hostbased intrusion detection," IEEE Transaction on Computers, vol. 51, no. 7, pp. 810-820, July 2002.
    • (2002) IEEE Transaction on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilber, S.4
  • 29
    • 0036575252 scopus 로고    scopus 로고
    • First-order versus high-order stochastic models for computer intrusion detection
    • N. Ye, T. Ehiabor and Y. Zhang, "First-order versus high-order stochastic models for computer intrusion detection," Quqlity and Reliability Engineering Internation, vol. 18, pp. 243-250, 2002.
    • (2002) Quqlity and Reliability Engineering Internation , vol.18 , pp. 243-250
    • Ye, N.1    Ehiabor, T.2    Zhang, Y.3
  • 30
    • 21844433474 scopus 로고    scopus 로고
    • Application of onlinetraining SVMs for real-time intrusiondetection with different considerations
    • July
    • Z. Zhang and H. Shen, "Application of onlinetraining SVMs for real-time intrusiondetection with different considerations", Computer Communications, Elsevier Science, vol. 28, no. 12, pp. 1428-1442, July 2005.
    • (2005) Computer Communications, Elsevier Science , vol.28 , Issue.12 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2
  • 31
    • 27544472033 scopus 로고    scopus 로고
    • Constructing multi-layer boundary to defend against intrusive anomalies: An autonomic detection coordinator
    • Yokohama, Japan, June 28-July 1
    • Z. Zhang and H. Shen, "Constructing multi-layer boundary to defend against intrusive anomalies: An autonomic detection coordinator," in Proceedings of the International Conference on Dependable Systems and Networks(DSN2005), Yokohama, Japan, pp. 118-127, June 28-July 1, 2005.
    • (2005) Proceedings of the International Conference on Dependable Systems and Networks(DSN2005) , pp. 118-127
    • Zhang, Z.1    Shen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.