메뉴 건너뛰기




Volumn 6, Issue 1, 2011, Pages 152-161

Transaction-pattern-based anomaly detection algorithm for IP multimedia subsystem

Author keywords

Anomaly detection; high order Markov chain; IP multimedia subsystem (IMS); next generation networks; support vector machine (SVM)

Indexed keywords

ANOMALY DETECTION; ANOMALY-DETECTION ALGORITHMS; CORE NETWORKS; DETECTION ALGORITHM; FEATURE SELECTION; HIGH-ORDER; IP ADDRESSS; IP MULTIMEDIA SUBSYSTEMS; IP NETWORKS; MARKOV KERNELS; MULTIMEDIA SUBSYSTEMS; NEXT GENERATION NETWORK; PREDICTION RATE; SECURITY ISSUES; TRANSACTION PATTERNS; USER EQUIPMENTS; VALUE ADDED SERVICE;

EID: 79951844361     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2095845     Document Type: Article
Times cited : (31)

References (30)
  • 4
    • 56949086676 scopus 로고    scopus 로고
    • An efficient end-to-end security mechanism for IP multimedia subsystem
    • Dec.
    • C. Y. Chen, T. Y. Wu, Y. M. Huang, and H. H. Chao, "An efficient end-to-end security mechanism for IP multimedia subsystem," Comput. Commun., vol. 31, no. 18, pp. 4259-4268, Dec. 2008.
    • (2008) Comput. Commun. , vol.31 , Issue.18 , pp. 4259-4268
    • Chen, C.Y.1    Wu, T.Y.2    Huang, Y.M.3    Chao, H.H.4
  • 5
    • 79951837206 scopus 로고    scopus 로고
    • Challenges to next generation services in IP multimedia subsystem
    • Jun. 2010
    • K. D. Chang, C. Y. Chen, J. L. Chen, and H. H. Chao, "Challenges to next generation services in IP multimedia subsystem," J. Inf. Process. Syst., vol. 6, no. 2, pp. 129-146, Jun. 2010.
    • J. Inf. Process. Syst. , vol.6 , Issue.2 , pp. 129-146
    • Chang, K.D.1    Chen, C.Y.2    Chen, J.L.3    Chao, H.H.4
  • 11
    • 0037002475 scopus 로고    scopus 로고
    • Intrusion detection: A brief history and overview
    • R. A. Kemmerer and G. Vigna, "Intrusion detection: A brief history and overview," Computer, vol. 35, pp. 27-30, 2002.
    • (2002) Computer , vol.35 , pp. 27-30
    • Kemmerer, R.A.1    Vigna, G.2
  • 12
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusiondetection systems
    • H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusiondetection systems," Ann. Telecommun., vol. 55, pp. 361-378, 2000.
    • (2000) Ann. Telecommun. , vol.55 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 13
    • 67649635433 scopus 로고    scopus 로고
    • Intrusion detection system for IP multimedia subsystem using K-nearest neighbor classifier
    • A. H. Farooqi and A. Munir, "Intrusion detection system for IP multimedia subsystem using K-nearest neighbor classifier," in Proc. IEEE Int. Multitopic Conf. (INMIC 2008), 2008, pp. 423-428.
    • (2008) Proc. IEEE Int. Multitopic Conf. (INMIC 2008) , pp. 423-428
    • Farooqi, A.H.1    Munir, A.2
  • 16
    • 34250634870 scopus 로고    scopus 로고
    • [Online].Available to be published
    • D. Pollard, Asymptopia First ed., 2000 [Online].Available: http://www. stat.yale.edu pollard/, to be published
    • (2000) Asymptopia First Ed.
    • Pollard, D.1
  • 17
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • C. J. C. Burges, "A tutorial on support vector machines for pattern recognition," Data Mining and Knowledge Discovery, vol. 2, pp. 121-167, Jun. 1, 1998. (Pubitemid 128695475)
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges, C.J.C.1
  • 18
    • 56549097799 scopus 로고    scopus 로고
    • High-order Markov kernels for intrusion detection
    • C. Yin, S. Tian, and S. Mu, "High-order Markov kernels for intrusion detection," Neurocomputers, vol. 71, pp. 3247-3252, 2008.
    • (2008) Neurocomputers , vol.71 , pp. 3247-3252
    • Yin, C.1    Tian, S.2    Mu, S.3
  • 19
    • 0041419360 scopus 로고    scopus 로고
    • The mixture transition distribution model for high-order Markov chains and non-Gaussian time series
    • Aug.
    • A. Berchtold and A. E. Raftery, "The mixture transition distribution model for high-order Markov chains and non-Gaussian time series," Statist. Sci., vol. 17, pp. 328-356, Aug. 2002.
    • (2002) Statist. Sci. , vol.17 , pp. 328-356
    • Berchtold, A.1    Raftery, A.E.2
  • 20
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic techniques for intrusion detection based on computer audit data
    • DOI 10.1109/3468.935043, PII S1083442701052882, Information Assurance
    • Y. Nong, L. Xiangyang, C. Qiang, S. M. Emran, and X. Mingming, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Trans. Syst., Man Cybern. A, Syst., Humans, vol. 31, no. 4, pp. 266-274, Jul. 2001. (Pubitemid 33142052)
    • (2001) IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans. , vol.31 , Issue.4 , pp. 266-274
    • Ye, N.1    Li, X.2    Chen, Q.3    Emran, S.M.4    Xu, M.5
  • 22
    • 79951829862 scopus 로고    scopus 로고
    • Open IMS Core Jul. 30, 2009 [Online]. Available
    • Open IMS Core Jul. 30, 2009 [Online]. Available: http://www.openimscore. org/
  • 23
    • 79951830952 scopus 로고    scopus 로고
    • UCT IMS Client Jul. 30, 2009 [Online]. Available
    • UCT IMS Client Jul. 30, 2009 [Online]. Available: http://uctimsclient. berlios.de/
  • 24
    • 79951836590 scopus 로고    scopus 로고
    • IMS/NGN Performance Benchmark Jul. 30, 2009 [Online]. Available
    • IMS/NGN Performance Benchmark Jul. 30, 2009 [Online]. Available: http://sipp.sourceforge.net/ims-bench/
  • 25
    • 79951845360 scopus 로고    scopus 로고
    • Wire Shark Jul. 30, 2009 [Online]. Available
    • Wire Shark Jul. 30, 2009 [Online]. Available: http://www.wireshark. org/
  • 26
    • 79951821066 scopus 로고    scopus 로고
    • TCPDump/Lib PCAP Jul. 30, 2009 [Online]. Available
    • TCPDump/Lib PCAP Jul. 30, 2009 [Online]. Available: http://www. tcpdump.org/
  • 27
    • 79951829232 scopus 로고    scopus 로고
    • LIBSVM\A Library for Support Vector Machines Jul. 30, 2009 [Online]. Available
    • LIBSVM\A Library for Support Vector Machines Jul. 30, 2009 [Online]. Available: http://www.csie.ntu.edu.tw/~cjlin/libsvm/
  • 28
    • 2942737360 scopus 로고    scopus 로고
    • IPv6 enabling IMS-based peer-to-peer services in 3GPP and 3GPP2 cellular networks
    • Apr.
    • J. Wiljakka, J. Soininen, J. Sundquist, and T. Sipilä, "IPv6 enabling IMS-based peer-to-peer services in 3GPP and 3GPP2 cellular networks," J. Internet Technol., vol. 5, no. 2, pp. 67-73, Apr. 2004.
    • (2004) J. Internet Technol. , vol.5 , Issue.2 , pp. 67-73
    • Wiljakka, J.1    Soininen, J.2    Sundquist, J.3    Sipilä, T.4
  • 29
    • 68249154935 scopus 로고    scopus 로고
    • Architectural aspects of automated network selection in heterogeneous wireless systems
    • F. Bari and V. C. M. Leung, "Architectural aspects of automated network selection in heterogeneous wireless systems," Int. J. Ad Hoc Ubiquitous Comput., vol. 4, no. 5, pp. 282-291, 2009.
    • (2009) Int. J. Ad Hoc Ubiquitous Comput. , vol.4 , Issue.5 , pp. 282-291
    • Bari, F.1    Leung, V.C.M.2
  • 30
    • 42149117774 scopus 로고    scopus 로고
    • Optimal routing for SIP-based session set up over IMS in mobile environment
    • DOI 10.1504/IJIPT.2007.016226
    • M. T. Alam and Z. D. Wu, "Optimal routing for SIP-based session set up over IMS in mobile environment," Int. J. Internet Protocol Technol., vol. 2, no. 3, pp. 264-276, 2007. (Pubitemid 351522893)
    • (2007) International Journal of Internet Protocol Technology , vol.2 , Issue.3-4 , pp. 264-276
    • Alam, M.T.1    Wu, Z.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.