메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Inductive intrusion detection in flow-based network data using One-Class Support Vector Machines

Author keywords

Machine learning; Netflow; Network intrusion detection; Support vector machine

Indexed keywords

ANOMALY DETECTION SYSTEMS; DEEP PACKET INSPECTION; FALSE ALARM RATE; INTRUSION DETECTION SYSTEMS; LARGE-SCALE NETWORK; MACHINE-LEARNING; NETFLOW; NETWORK DATA; NETWORK FLOWS; NETWORK INTRUSION DETECTION; NETWORK INTRUSION DETECTION SYSTEMS; NETWORK SPEED; NETWORK TRAFFIC; ONE-CLASS SUPPORT VECTOR MACHINE; PERFORMANCE PROBLEMS; RESEARCH EFFORTS;

EID: 79952826624     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2011.5720582     Document Type: Conference Paper
Times cited : (83)

References (20)
  • 5
    • 77955469676 scopus 로고    scopus 로고
    • An overview of IP flow-based intrusion detection
    • A. Sperotto et al., "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
    • (2010) IEEE Communications Surveys Tutorials , vol.12 , Issue.3 , pp. 343-356
    • Sperotto, A.1
  • 6
  • 7
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, "Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 10
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm a provocative discussion
    • DOI 10.1145/1278940.1278945, Proceedings - New Security Paradigms Workshop 2006
    • C. Gates and C. Taylor, "Challenging the anomaly detection paradigm: a provocative discussion," in Proc. of the 2006 workshop on New security paradigms (NSPW '06), New York, NY, USA, 2007, pp. 21-29. (Pubitemid 350239697)
    • (2007) Proceedings New Security Paradigms Workshop , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 11
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • May
    • R. Sommer and V. Paxson, "Outside the closed world: On using machine learning for network intrusion detection," in IEEE Symposium on Security and Privacy (S&P), May 2010, pp. 305-316.
    • (2010) IEEE Symposium on Security and Privacy (S&P) , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 14
    • 36049030250 scopus 로고    scopus 로고
    • A new intrusion detection system using support vector machines and hierarchical clustering
    • L. Khan, M. Awad, and B. Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering," The VLDB Journal, vol. 16, no. 4, pp. 507-521, 2007.
    • (2007) The VLDB Journal , vol.16 , Issue.4 , pp. 507-521
    • Khan, L.1    Awad, M.2    Thuraisingham, B.3
  • 15
    • 79952855984 scopus 로고    scopus 로고
    • "Grml," http://www.grml.org.
  • 16
    • 79952850718 scopus 로고    scopus 로고
    • "tcpdump / libpcap," http://www.tcpdump.org.
  • 17
    • 79952857486 scopus 로고    scopus 로고
    • "softflowd," http://www.mindrot.org/projects/softflowd/.
    • Softflowd


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.