메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 311-318

A novel network traffic anomaly detection model based on superstatistics theory

Author keywords

Network traffic; Pareto distribution; Superstatistics

Indexed keywords

COMPLEX DYNAMIC SYSTEMS; DETECTION METHODS; DIFFERENT DISTRIBUTIONS; DRIVING FACTORS; KEY DETERMINANTS; MUTUAL INTERACTION; NETWORK ANOMALIES; NETWORK CHARACTERISTICS; NETWORK EQUIPMENT; NETWORK SIZE; NETWORK STRUCTURES; NETWORK TECHNOLOGIES; NETWORK TRAFFIC; NETWORK TRAFFIC FLOW; NETWORK USERS; NONSTATIONARY; NOVEL METHODS; PARETO DISTRIBUTIONS; SUPERSTATISTICS; TIME-SCALES; TOPOLOGY CONFIGURATIONS; TRAFFIC TIME SERIES; TRANSMISSION PROTOCOLS;

EID: 79951799944     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.6.2.311-318     Document Type: Article
Times cited : (5)

References (32)
  • 1
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and review
    • Apr. 2002
    • R. A. Kemmerer and G. Vigna, Intrusion detection: A brief history and review, Computer, vol. 35, no. 4, pp. 27-30, Apr. 2002.
    • Computer , vol.35 , Issue.4 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 2
    • 0028430224 scopus 로고    scopus 로고
    • Network Intrusion Detection
    • May/Jun. 1994
    • B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network intrusion detection, IEEE Netw., vol. 8, no. 3, pp. 26-41, May/Jun. 1994.
    • IEEE Netw , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 3
    • 40549108657 scopus 로고    scopus 로고
    • Network Intrusion Detection Using CFAR Abrupt-Change Detectors, Instrumentation and Measurement
    • Mar 2008
    • Di He Leung, H. Network Intrusion Detection Using CFAR Abrupt-Change Detectors, Instrumentation and Measurement, IEEE Transactions on, Volume: 57,pp: 490-497,Mar 2008
    • IEEE Transactions On , vol.57 , pp. 490-497
    • di He Leung, H.1
  • 4
    • 0035271352 scopus 로고    scopus 로고
    • An Anomaly Detection Technique Based on A ChiSquare Statistic for Detecting Intrusion Into Information System
    • Ye N. and Chen, Q. An Anomaly Detection Technique Based on A ChiSquare Statistic for Detecting Intrusion Into Information System, Quality and Reliability Engineering International, 17, pp. 105-112. 2001
    • (2001) Quality and Reliability Engineering International , vol.17 , pp. 105-112
    • Ye, N.1    Chen, Q.2
  • 5
    • 10244261530 scopus 로고    scopus 로고
    • EWMA Forecast of Normal System Activity for Computer Intrusion Detection
    • Ye, N., Chen, Q. and Borror, C.M. EWMA Forecast of Normal System Activity for Computer Intrusion Detection, IEEE Transaction on Reliability, Vol. 53, No.4, pp. 557-566. 2004
    • (2004) IEEE Transaction On Reliability , vol.53 , Issue.4 , pp. 557-566
    • Ye, N.1    Chen, Q.2    Borror, C.M.3
  • 6
    • 6944226924 scopus 로고    scopus 로고
    • Long-range Dependence: Ten Years of Internet Traffic Modeling [J]
    • Karagiannis T, Molle M, Faloutsos M. Long-range Dependence: Ten Years of Internet Traffic Modeling [J]. IEEE Internet Computing, 2004, 8(5):57-64
    • (2004) IEEE Internet Computing , vol.8 , Issue.5 , pp. 57-64
    • Karagiannis, T.1    Molle, M.2    Faloutsos, M.3
  • 15
    • 35248857893 scopus 로고    scopus 로고
    • An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection
    • In Proceeding of Recent Advances in Intrusion Detection (RAID, Springer Verlag, September 8-10 2003
    • M. Mahoney and P. Chan. An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection. In Proceeding of Recent Advances in Intrusion Detection (RAID) 2003, volume 2820 of Lecture Notes in Computer Science, pages 220-237. Springer Verlag, September 8-10 2003.
    • (2003) Lecture Notes In Computer Science , vol.2820 , pp. 220-237
    • Mahoney, M.1    Chan, P.2
  • 17
    • 79951796787 scopus 로고    scopus 로고
    • DARPA 99 Intrusion Detection Data Set Attack Documentation
    • DARPA 99 Intrusion Detection Data Set Attack Documentation, http://www.ll.mit.edu/IST/ideval/docs/1999/attackDB.html
  • 18
    • 0001075431 scopus 로고
    • Statistical inference using extreme order statistics
    • Pickands, J., 1975. Statistical inference using extreme order statistics. The Annals of Statistics 3, 119-131.
    • (1975) The Annals of Statistics , vol.3 , pp. 119-131
    • Pickands, J.1
  • 19
    • 0000737722 scopus 로고
    • In: Statistical Extremes and Applications, ed. J. Tiago de Oliveira, Dordrecht: D. Reidel
    • Davison, A.C., 1984. Modeling excesses over high thresholds, with an application. In: Statistical Extremes and Applications, ed. J. Tiago de Oliveira, Dordrecht: D. Reidel, pp. 461-482.
    • (1984) Modeling Excesses Over High Thresholds, With An Application , pp. 461-482
    • Davison, A.C.1
  • 21
    • 79951805880 scopus 로고    scopus 로고
    • cond-mat/0506301
    • H. Hasegawa, cond-mat/0506301.
    • Hasegawa, H.1
  • 22
    • 0029323403 scopus 로고
    • Wide Area Traffic: The Failure of Poisson Modeling
    • V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, 1995, pp. 226-244
    • (1995) IEEE/ACM Trans. Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 23
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • Jan. 2003
    • K. M. C. Tan and R. A. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. Sel. Areas Commun., vol. 21, no. 1, pp. 96-110, Jan. 2003.
    • IEEE J. Sel. Areas Commun , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.M.C.1    Maxion, R.A.2
  • 24
    • 0030486058 scopus 로고    scopus 로고
    • Estimating the probability of obtaining nonfeasible parameter estimates of the generalized Pareto distribution
    • Dupuis, D.J., 1996. Estimating the probability of obtaining nonfeasible parameter estimates of the generalized Pareto distribution. Journal of Statistical Computation and Simulation 54, 197-209
    • (1996) Journal of Statistical Computation and Simulation , vol.54 , pp. 197-209
    • Dupuis, D.J.1
  • 25
    • 0034997287 scopus 로고    scopus 로고
    • Generalized probability weighted moments: Application to the generalized Pareto distribution
    • Rasmussen, P.F., 2001. Generalized probability weighted moments: Application to the generalized Pareto distribution. Water Resources Research 37 (6), 1745-1751.
    • (2001) Water Resources Research , vol.37 , Issue.6 , pp. 1745-1751
    • Rasmussen, P.F.1
  • 26
    • 0000737722 scopus 로고
    • Modeling excesses over high thresholds, with an application
    • ed. J. Tiago de Oliveira, Dordrecht: D. Reidel
    • Davison, A.C., 1984. Modeling excesses over high thresholds, with an application. In: Statistical Extremes and Applications, ed. J. Tiago de Oliveira, Dordrecht: D. Reidel, pp. 461-482.
    • (1984) Statistical Extremes and Applications , pp. 461-482
    • Davison, A.C.1
  • 27
    • 0742324903 scopus 로고    scopus 로고
    • A formal framework for positiveand negative detection schemes
    • Feb. 2004
    • F. Esponda, S. Forrest, and P. Helman, "A formal framework for positiveand negative detection schemes," IEEE Trans. Syst., Man, Cybern. B,Cybern., vol. 34, no. 1, pp. 357-373, Feb. 2004.
    • IEEE Trans. Syst., Man, Cybern. B,Cybern , vol.34 , Issue.1 , pp. 357-373
    • Esponda, F.1    Forrest, S.2    Helman, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.