메뉴 건너뛰기




Volumn 6476 LNCS, Issue , 2010, Pages 459-471

A two-tier system for web attack detection using linear discriminant method

Author keywords

Feature selection; Intrusion detection; Linear discriminant method; Packet payload; Web based attack

Indexed keywords

COMPUTATIONAL COSTS; DATA SETS; FEATURE SELECTION; FEATURE SPACE; FINAL DECISION; HIGH-DIMENSIONAL FEATURE SPACE; INTRUSION DETECTION SYSTEMS; LINEAR DISCRIMINANTS; NETWORK ATTACK; PACKET PAYLOADS; STATISTICAL SIGNATURES; WEB ATTACKS; WEB-BASED ATTACKS; WORST CASE; LOW DIMENSIONAL;

EID: 78650910973     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-17650-0_32     Document Type: Conference Paper
Times cited : (5)

References (17)
  • 1
    • 0013347631 scopus 로고    scopus 로고
    • Corporation, M.: accessed June 16, 2006
    • Corporation, M.: Common vulnerabilities and exposures, http://cve.mitre.org/ (accessed June 16, 2006)
    • Common Vulnerabilities and Exposures
  • 2
    • 21244492864 scopus 로고    scopus 로고
    • Low Volume Viruses: New Tools for Criminals
    • Kay, J.: Low Volume Viruses: New Tools for Criminals. Network Security, 16-18 (2005)
    • (2005) Network Security , pp. 16-18
    • Kay, J.1
  • 4
    • 78650895481 scopus 로고    scopus 로고
    • TippingPoint, http://www.tippingpoint.com/
  • 5
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-time
    • Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31, 2435-2463 (1999)
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 6
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
    • Patcha, A., Park, J.M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks 51, 3448-3470 (2007) (Pubitemid 46921030)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 7
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous Payload-based Network Intrusion Detection
    • Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
    • Wang, K., Stolfo, S.J.: Anomalous Payload-based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 8
    • 0037661195 scopus 로고    scopus 로고
    • Network Traffic Anomaly Detection Based on Packet Bytes
    • ACM, New York
    • Mahoney, M.V.: Network Traffic Anomaly Detection Based on Packet Bytes. In: The 2003 ACM Symposium on Applied Computing, pp. 346-350. ACM, New York (2003)
    • (2003) The 2003 ACM Symposium on Applied Computing , pp. 346-350
    • Mahoney, M.V.1
  • 10
  • 11
    • 33845998197 scopus 로고    scopus 로고
    • Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System
    • Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. Springer, Heidelberg
    • Chen, Y., Li, Y., Cheng, X.Q., Guo, L.: Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol. 4318, pp. 153-167. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4318 , pp. 153-167
    • Chen, Y.1    Li, Y.2    Cheng, X.Q.3    Guo, L.4
  • 12
    • 0036038437 scopus 로고    scopus 로고
    • Service Specific Anomaly detection for Network Intrusion Detection
    • ACM, New York
    • Krugel, C., Toth, T., Kirda, E.: Service Specific Anomaly detection for Network Intrusion Detection. In: The 2002 ACM Symposium on Applied Computing, pp. 201-208. ACM, New York (2002)
    • (2002) The 2002 ACM Symposium on Applied Computing , pp. 201-208
    • Krugel, C.1    Toth, T.2    Kirda, E.3
  • 13
    • 33750335757 scopus 로고    scopus 로고
    • Anagram: A Content Anomaly Detector Resistant to Mimicry Attack
    • Zamboni, D., Krügel, C. (eds.) RAID 2006. Springer, Heidelberg
    • Wang, K., Parekh, J., Stolfo, S.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4219 , pp. 226-248
    • Wang, K.1    Parekh, J.2    Stolfo, S.3
  • 14
    • 58049125337 scopus 로고    scopus 로고
    • Detection of Anomalous Network Packets Using Lightweight Stateless Payload Inspection
    • Nwanze, N., Summerville, D.: Detection of Anomalous Network Packets Using Lightweight Stateless Payload Inspection. In: The 33rd IEEE Conference on Local Computer Networks, pp. 911-918 (2008)
    • (2008) The 33rd IEEE Conference on Local Computer Networks , pp. 911-918
    • Nwanze, N.1    Summerville, D.2
  • 15
    • 79951924804 scopus 로고    scopus 로고
    • Network Intrusion Detection Based on LDA for Payload Feature Selection
    • IEEE Press, Los Alamitos to appear
    • Tan, Z., Jamdagni, A., Nanda, P., He, X.: Network Intrusion Detection Based on LDA for Payload Feature Selection. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security, pp. 1-5. IEEE Press, Los Alamitos (2010) (to appear)
    • (2010) IEEE Globecom 2010 Workshop on Web and Pervasive Security , pp. 1-5
    • Tan, Z.1    Jamdagni, A.2    Nanda, P.3    He, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.