메뉴 건너뛰기




Volumn , Issue , 2011, Pages 181-185

Consensus extraction from heterogeneous detectors to improve performance over network traffic anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS EVENTS; ANOMALY DETECTION; ANOMALY DETECTOR; BAYESIAN MODEL AVERAGING; DATA SETS; DENIAL OF SERVICE ATTACKS; DETRIMENTAL EFFECTS; DISCRIMINATIVE MODELS; FALSE POSITIVE; NEGATIVE RATES; NETWORK ANOMALY DETECTION; NETWORK OPERATOR; NETWORK TRAFFIC; NON-TRIVIAL; PORT SCANS; TRAFFIC DATA; TRAFFIC RECORDS; WEIGHTED VOTING;

EID: 79960863336     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5934982     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 2
    • 77952384694 scopus 로고    scopus 로고
    • Principled reasoning and practical applications of alert fusion in intrusion detection systems
    • G. Gu, A. A. Cárdenas, and W. Lee, "Principled reasoning and practical applications of alert fusion in intrusion detection systems," in Proc. ACM ASIACCS, 2008, pp. 136-147.
    • (2008) Proc.ACM ASIACCS , pp. 136-147
    • Gu, G.1    Cárdenas, A.A.2    Lee, W.3
  • 6
    • 33748611921 scopus 로고    scopus 로고
    • Ensemble based systems in decision making
    • R. Polikar, "Ensemble based systems in decision making," IEEE Circuits and Systems Magazine, vol. 6, no. 3, pp. 21-45, 2006.
    • (2006) IEEE Circuits and Systems Magazine , vol.6 , Issue.3 , pp. 21-45
    • Polikar, R.1
  • 10
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • A. Soule, K. Salamatian, and N. Taft, "Combining filtering and statistical methods for anomaly detection," in Proc. ACM IMC, 2005, pp. 331-344.
    • (2005) Proc.ACM IMC , pp. 331-344
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 11
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. ACM SIGCOMM, 2005, pp. 217-228.
    • (2005) Proc. ACM SIGCOMM , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 12
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in Proc. ACM IMC, 2005, pp. 345-350.
    • (2005) Proc.ACM IMC , pp. 345-350
    • Gu, Y.1    McCallum, A.2    Towsley, D.3
  • 13
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proc. ACM IMW, 2002, pp. 71-82.
    • (2002) Proc.ACM IMW , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 14
    • 77954790951 scopus 로고    scopus 로고
    • Using artificial anomalies to detect unknown and known network intrusions
    • W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan, "Using artificial anomalies to detect unknown and known network intrusions," Knowl. Inf. Syst., vol. 6, pp. 507-527, 2004.
    • (2004) Knowl. Inf. Syst. , vol.6 , pp. 507-527
    • Fan, W.1    Miller, M.2    Stolfo, S.3    Lee, W.4    Chan, P.5
  • 15
    • 37849053357 scopus 로고    scopus 로고
    • Outlier detection in sensor networks
    • B. Sheng, Q. Li, W. Mao, and W. Jin, "Outlier detection in sensor networks," in Proc. Mobihoc, 2007, pp. 219-228.
    • (2007) Proc. Mobihoc , pp. 219-228
    • Sheng, B.1    Li, Q.2    Mao, W.3    Jin, W.4
  • 16
    • 0041965980 scopus 로고    scopus 로고
    • Cluster ensembles - A knowledge reuse framework for combining multiple partitions
    • A. Strehl and J. Ghosh, "Cluster ensembles - a knowledge reuse framework for combining multiple partitions," Journal of Machine Learning Research, vol. 3, pp. 583-617, 2003.
    • (2003) Journal of Machine Learning Research , vol.3 , pp. 583-617
    • Strehl, A.1    Ghosh, J.2
  • 17
    • 84863338443 scopus 로고    scopus 로고
    • Graph-based consensus maximization among multiple supervised and unsupervised models
    • J. Gao, F. Liang, W. Fan, Y. Sun, and J. Han, "Graph-based consensus maximization among multiple supervised and unsupervised models," in Proc. NIPS, 2009.
    • (2009) Proc. NIPS
    • Gao, J.1    Liang, F.2    Fan, W.3    Sun, Y.4    Han, J.5
  • 18
    • 0036079912 scopus 로고    scopus 로고
    • Alert correlation in a cooperative intrusion detection framework
    • F. Cuppens and A. Miége, "Alert correlation in a cooperative intrusion detection framework," in Proc. IEEE S & P, 2002, pp. 202-215.
    • (2002) Proc.IEEE S & P , pp. 202-215
    • Cuppens, F.1    Miége, A.2
  • 19
    • 0242529344 scopus 로고    scopus 로고
    • Aggregation and correlation of intrusion-detection alerts
    • H. Debar and A. Wespi, "Aggregation and correlation of intrusion-detection alerts," in Proc. RAID, 2001, pp. 85-103.
    • (2001) Proc. RAID , pp. 85-103
    • Debar, H.1    Wespi, A.2
  • 20
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multisensor data fusion
    • T. Bass, "Intrusion detection systems and multisensor data fusion," Communications of ACM, vol. 43, no. 4, pp. 99-105, 2000.
    • (2000) Communications of ACM , vol.43 , Issue.4 , pp. 99-105
    • Bass, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.