메뉴 건너뛰기




Volumn , Issue , 2011, Pages 202-209

Fuzzy logic based anomaly detection for embedded network security cyber sensor

Author keywords

Anomaly Detection; Cyber Sensor; Embedded Systems; Fuzzy Logic System; Online Clustering

Indexed keywords

ANOMALY DETECTION; COMPUTATIONAL REQUIREMENTS; CRITICAL ASSET; CYBER SENSOR; CYBER TERRORISM; EMBEDDED NETWORK; FUZZY LOGIC RULES; FUZZY LOGIC SYSTEM; HARDWARE IMPLEMENTATIONS; INCOMING PACKETS; NETWORK BEHAVIORS; NETWORK DATA; ONLINE-CLUSTERING;

EID: 79961184981     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CICYBS.2011.5949392     Document Type: Conference Paper
Times cited : (58)

References (29)
  • 3
    • 79961179005 scopus 로고    scopus 로고
    • Critical infrastructure: Control systems and the terrorist threat
    • February
    • Dana A. Shea, "Critical Infrastructure: Control Systems and the Terrorist Threat," Report for Congress RL31534, February, 2003.
    • (2003) Report for Congress RL31534
    • Shea, D.A.1
  • 6
    • 0023294428 scopus 로고
    • An intrusion detection model
    • February
    • D. E. Denning, "An Intrusion Detection Model," in IEEE Trans. on Software Engineering,vol. SE-13, pp. 222-232, February 1987.
    • (1987) IEEE Trans. on Software Engineering , vol.SE-13 , pp. 222-232
    • Denning, D.E.1
  • 7
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Oakland, California
    • R. Sommer, V. Paxson, "Outside the Closed World: On Using Machine Learning For Network Intrusion Detection," in Proc. of IEEE Symp. on Security and Privacy, Oakland, California, pp. 305-316, 2010.
    • (2010) Proc. of IEEE Symp. on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 13
    • 70449371464 scopus 로고    scopus 로고
    • Neural network based intrusion detection system for critical infrastructures
    • Atlanta, Georgia, June 14-19
    • O. Linda, T. Vollmer, M. Manic,"Neural Network Based Intrusion Detection System for Critical Infrastructures," in Proc. Int. Joint INNSIEEE Conf. on Neural Networks, Atlanta, Georgia, June 14-19, 2009.
    • (2009) Proc. Int. Joint INNSIEEE Conf. on Neural Networks
    • Linda, O.1    Vollmer, T.2    Manic, M.3
  • 15
    • 77953759247 scopus 로고    scopus 로고
    • Decision tree classifier for network intrusion detection with GA-based feature selection
    • Kennesaw, GA, March
    • G. Stein, B. Chen, A. S. Wu, K. A. Hua, "Decision Tree Classifier For Network Intrusion Detection With GA-based Feature Selection," in Proc. of the 43rd ACM Southeast Conference, Kennesaw, GA, March 2005.
    • (2005) Proc. of the 43rd ACM Southeast Conference
    • Stein, G.1    Chen, B.2    Wu, A.S.3    Hua, K.A.4
  • 21
    • 67650434654 scopus 로고    scopus 로고
    • An architecture for exploiting multi-core processor to parallelize network intrusion prevention
    • R. Sommer, V. Paxson, N. Weaver, "An architecture for exploiting multi-core processor to parallelize network intrusion prevention," Concurrency Computation: Practice and Experience, 21: 1255-1279, 2009.
    • (2009) Concurrency Computation: Practice and Experience , vol.21 , pp. 1255-1279
    • Sommer, R.1    Paxson, V.2    Weaver, N.3
  • 22
    • 79961202806 scopus 로고    scopus 로고
    • from October
    • Tofino webpage [URL], Available: http://www.tofinosecurity.com, from October 2010.
    • (2010) Tofino Webpage
  • 28
    • 79961202310 scopus 로고    scopus 로고
    • from October
    • Nmap webpage [URL], Available: http://nmap.org, from October 2010.
    • (2010) Nmap Webpage
  • 29
    • 79961195561 scopus 로고    scopus 로고
    • from October
    • Nessus webpage [URL], Available: http://www.nessus.org.org/nessus/, from October 2010.
    • (2010) Nessus Webpage


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.