메뉴 건너뛰기




Volumn 5821 LNCS, Issue , 2009, Pages 297-308

Detecting network anomalies using CUSUM and EM clustering

Author keywords

Clustering; Intrusion detection

Indexed keywords

ACCURATE INFERENCE; ANOMALY DETECTION METHODS; ANOMALY DETECTOR; CLUSTERING; CUMULATIVE SUMS; DATA SETS; DETECTION ACCURACY; DETECTION TECHNIQUE; EM CLUSTERING; EVENT REPORT; EXPERIMENTAL EVALUATION; FALSE ALARM RATE; HYBRID APPROACH; HYBRID FRAMEWORK; INTRUSION DETECTION SYSTEMS; INTRUSION DETECTORS; MULTI SENSOR; NETWORK ANOMALIES; NETWORK TRAFFIC; NON-PARAMETRIC; NUMBER OF FALSE ALARMS; OPTIMAL PERFORMANCE; SECURITY OPERATORS;

EID: 78650707559     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04843-2_32     Document Type: Conference Paper
Times cited : (13)

References (33)
  • 5
    • 49649112245 scopus 로고    scopus 로고
    • Analysis of a Computer Security Dataset: Why Machine Learning Algorithms Fail on KDD Dataset for Misuse Detection
    • Sabhnani, M., Serpen, G.: Analysis of a Computer Security Dataset: Why Machine Learning Algorithms Fail on KDD Dataset for Misuse Detection. Intelligent Data Analysis 8(4), 403-415 (2004)
    • (2004) Intelligent Data Analysis , vol.8 , Issue.4 , pp. 403-415
    • Sabhnani, M.1    Serpen, G.2
  • 9
    • 0003964874 scopus 로고
    • Next Generation Intrusion Detection Expert System (NIDES)
    • Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0 May
    • Anderson, D., Frivold, T., Tamaru, A., Valdes, A.: Next Generation Intrusion Detection Expert System (NIDES). Software Users Manual, Beta-Update release. Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0 (May 1994)
    • (1994) Software Users Manual, Beta-Update Release
    • Anderson, D.1    Frivold, T.2    Tamaru, A.3    Valdes, A.4
  • 14
    • 25844491810 scopus 로고    scopus 로고
    • An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks
    • Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert Systems with Applications 29(4), 713-722
    • Expert Systems with Applications , vol.29 , Issue.4 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Ciliz, M.K.4
  • 15
    • 33847743856 scopus 로고    scopus 로고
    • Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
    • Qin, M., Hwang, K., Cai, M., Chen, Y.: Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing 4(1), 41-55
    • IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 41-55
    • Qin, M.1    Hwang, K.2    Cai, M.3    Chen, Y.4
  • 18
    • 33750514606 scopus 로고    scopus 로고
    • Modeling Intrusion Detection System using Hybrid Intelligent Systems
    • Special issue on Network and Information Security: A Computational Intelligence Approach
    • Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling Intrusion Detection System using Hybrid Intelligent Systems. Special issue on Network and Information Security: A Computational Intelligence Approach. Journal of Network and Computer Applications 30(1), 114-132 (2007)
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 114-132
    • Peddabachigari, S.1    Abraham, A.2    Grosan, C.3    Thomas, J.4
  • 19
    • 34250801472 scopus 로고    scopus 로고
    • A Hybrid Machine Learning Approach to Network Anomaly Detection
    • Shon, T., Moon, J.: A Hybrid Machine Learning Approach to Network Anomaly Detection. International Journal on Information Sciences 177(18), 3799-3821 (2007)
    • (2007) International Journal on Information Sciences , vol.177 , Issue.18 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 21
    • 78650680807 scopus 로고    scopus 로고
    • http://nsl.cs.unb.ca/wei/hybrid.htm
  • 23
    • 85085235971 scopus 로고    scopus 로고
    • Unsupervised anomaly detection using an evolutionary extension of k-means algorithm
    • DOI 10.1504/IJICS.2008.018513
    • Lu, W., Traore, I.: Unsupervised anomaly detection using an evolutionary extension of Kmeans algorithm. International Journal on Information and Computer Security 2(2), 107-139 (2008) (Pubitemid 351802737)
    • (2008) International Journal of Information and Computer Security , vol.2 , Issue.2 , pp. 107-139
    • Lu, W.1    Traore, I.2
  • 25
    • 78650717082 scopus 로고    scopus 로고
    • http://www.ethereal.com/docs/man-pages/editcap.1.html
  • 26
    • 78650708556 scopus 로고    scopus 로고
    • http://www.wireshark.org/docs/man-pages/tshark.html
  • 27
    • 78650694159 scopus 로고    scopus 로고
    • http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.kddcup
  • 28
    • 78650714957 scopus 로고    scopus 로고
    • http://www.ll.mit.edu/IST/ideval/data/1998/ 1998-data-index.html
  • 30
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262-294 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 32
    • 78650712222 scopus 로고    scopus 로고
    • http://www.ll.mit.edu/IST/ideval/data/1999/ 1999-data-index.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.