메뉴 건너뛰기




Volumn 5495 LNCS, Issue , 2009, Pages 527-536

A novel signal-based approach to anomaly detection in IDS systems

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; MATCHING PURSUIT; TOLERANCE SYSTEMS; WORM DETECTION;

EID: 78650728514     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04921-7_54     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 1
    • 27244454402 scopus 로고    scopus 로고
    • Real Time Detection of Novel Attacks by Means of Data Mining Techniques
    • Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Real Time Detection of Novel Attacks by Means of Data Mining Techniques. ICEIS (3), 120-127 (2005)
    • (2005) ICEIS , Issue.3 , pp. 120-127
    • Esposito, M.1    Mazzariello, C.2    Oliviero, F.3    Romano, S.P.4    Sansone, C.5
  • 2
    • 78650753809 scopus 로고    scopus 로고
    • Evaluating Pattern Recognition Techniques in Intrusion Detection Systems
    • Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C.: Evaluating Pattern Recognition Techniques in Intrusion Detection Systems. In: PRIS 2005, pp. 144-153 (2005)
    • (2005) PRIS 2005 , pp. 144-153
    • Esposito, M.1    Mazzariello, C.2    Oliviero, F.3    Romano, S.P.4    Sansone, C.5
  • 3
    • 78650736995 scopus 로고    scopus 로고
    • INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks
    • FP7 INTERSECTION
    • FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project - Description of Work
    • Project - Description of Work
  • 4
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Cheng, C.-M., Kung, H.T., Tan, K.-S.: Use of spectral analysis in defense against DoS attacks. In: IEEE GLOBECOM 2002, pp. 2143-2148 (2002)
    • (2002) IEEE GLOBECOM 2002 , pp. 2143-2148
    • Cheng, C.-M.1    Kung, H.T.2    Tan, K.-S.3
  • 7
    • 84952326439 scopus 로고    scopus 로고
    • DDos attack detection and wavelets
    • Li, L., Lee, G.: DDos attack detection and wavelets. In: IEEE ICCCN 2003, October 2003, pp. 421-427 (2003)
    • (2003) IEEE ICCCN 2003, October 2003 , pp. 421-427
    • Li, L.1    Lee, G.2
  • 9
    • 0027842081 scopus 로고
    • Zhang: Matching Pursuit with time-frequency dictionaries
    • Mallat, S., Zhang: Matching Pursuit with time-frequency dictionaries. IEEE Transactions on Signal Processing 41(12), 3397-3415 (1993)
    • (1993) IEEE Transactions on Signal Processing , vol.41 , Issue.12 , pp. 3397-3415
    • Mallat, S.1
  • 10
    • 5444237123 scopus 로고    scopus 로고
    • Greed is Good: Algorithmic Results for Sparse Approximation
    • October
    • Troop, J.A.: Greed is Good: Algorithmic Results for Sparse Approximation. IEEE Transactions on Information Theory 50(10) (October 2004)
    • (2004) IEEE Transactions on Information Theory , vol.50 , Issue.10
    • Troop, J.A.1
  • 11
    • 0035339685 scopus 로고    scopus 로고
    • Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps
    • Gribonval, R.: Fast Matching Pursuit with a Multiscale Dictionary of Gaussian Chirps. IEEE Transactions on Signal Processing 49(5) (2001)
    • (2001) IEEE Transactions on Signal Processing , vol.49 , Issue.5
    • Gribonval, R.1
  • 12
    • 72749087934 scopus 로고    scopus 로고
    • Tree-Based Pursuit: Algorithm and Properties
    • Swiss Federal Institute of Technology Lausanne (EPFL), TR-ITS-2005.013 May 17
    • Jost, P., Vandergheynst, P., Frossard, P.: Tree-Based Pursuit: Algorithm and Properties. Swiss Federal Institute of Technology Lausanne (EPFL),Signal Processing Institute Technical Report,TR-ITS-2005.013 (May 17, 2005)
    • (2005) Signal Processing Institute Technical Report
    • Jost, P.1    Vandergheynst, P.2    Frossard, P.3
  • 13
    • 38549112565 scopus 로고    scopus 로고
    • Worm Traffic Analysis and Characterization
    • IEEE CS Press, Los Alamitos
    • Dainotti, A., Pescape, A., Ventre, G.: Worm Traffic Analysis and Characterization. In: Proceedings of ICC, pp. 1435-1442. IEEE CS Press, Los Alamitos (2007)
    • (2007) Proceedings of ICC , pp. 1435-1442
    • Dainotti, A.1    Pescape, A.2    Ventre, G.3
  • 16
    • 78650733439 scopus 로고    scopus 로고
    • March 19-24, Colleen Shanon and David Moore
    • The CAIDA Dataset on the Witty Worm - March 19-24, Colleen Shanon and David Moore (2004), http://www.caida.org/passive/witty
    • (2004) The CAIDA Dataset on the Witty Worm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.