메뉴 건너뛰기




Volumn 16, Issue 1, 2011, Pages 20-28

Clustering NGN user behavior for anomaly detection

Author keywords

NGN security; User behavior modeling; User behavior monitoring

Indexed keywords

ACADEMIC RESEARCH; ANOMALY DETECTION; NETWORK CONNECTIVITY; NGN SECURITY; SECURITY AND PRIVACY; USER BEHAVIOR MODELING; USER BEHAVIORS;

EID: 80052786412     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2010.10.011     Document Type: Article
Times cited : (4)

References (24)
  • 3
    • 80052786866 scopus 로고    scopus 로고
    • USENIX Association Berkeley, CA Proceedings of the Steps To Reducing Unwanted Traffic on the internet Workshop (Cambridge, MA)
    • R. Dantu, and P. Kolan Detecting spam in VoIP networks 2005 USENIX Association Berkeley, CA Proceedings of the Steps To Reducing Unwanted Traffic on the internet Workshop (Cambridge, MA)
    • (2005) Detecting Spam in VoIP Networks
    • Dantu, R.1    Kolan, P.2
  • 4
    • 76249118183 scopus 로고    scopus 로고
    • An innovative way to analyze large ISP data for IMS security and monitoring
    • Intelligence in Next Generation Networks, ICIN. 26-29 October 2009 10.1109/ICIN.2009.5357065
    • P. De Lutiis, and D. Lombardo An innovative way to analyze large ISP data for IMS security and monitoring Intelligence in Next Generation Networks, ICIN 2009. 13th International Conference on 26-29 October 2009 10.1109/ICIN.2009. 5357065 pp. 1-6
    • (2009) 13th International Conference , pp. 1-6
    • De Lutiis, P.1    Lombardo, D.2
  • 5
    • 64849083317 scopus 로고    scopus 로고
    • Benchmarking graph-based clustering algorithms
    • 7th IAPR- TC15 Workshop on Graph-based Representations (GbR 2007) ISSN 0262-8856
    • P. Foggia, G. Percannella, C. Sansone, and M. Vento Benchmarking graph-based clustering algorithms 7th IAPR- TC15 Workshop on Graph-based Representations (GbR 2007) Image and Vision Computing 27 Issue 7 4 June 2009 979 988 ISSN 0262-8856
    • (2009) Image and Vision Computing , vol.27 , Issue.7 , pp. 979-988
    • Foggia, P.1    Percannella, G.2    Sansone, C.3    Vento, M.4
  • 6
    • 76249122979 scopus 로고    scopus 로고
    • Moving dispersion method for statistical anomaly detection in intrusion detection systems
    • J.Dj. Golic Moving dispersion method for statistical anomaly detection in intrusion detection systems ISC International Journal of Information Security 1 no. 2 July 2009 3 22
    • (2009) ISC International Journal of Information Security , vol.1 , Issue.2 , pp. 3-22
    • Golic, J.Dj.1
  • 10
    • 77950660500 scopus 로고    scopus 로고
    • Voice-over-IP security: Research and practice
    • March/April
    • A.D. Keromytis Voice-over-IP security: research and practice IEEE Security and Privacy March/April, 2010 76 78
    • (2010) IEEE Security and Privacy , pp. 76-78
    • Keromytis, A.D.1
  • 11
    • 0025489075 scopus 로고
    • The self-organizing map
    • T. Kohonen The self-organizing map Proceedings of the IEEE 78 no. 9 September 1990 1464 1480
    • (1990) Proceedings of the IEEE , vol.78 , Issue.9 , pp. 1464-1480
    • Kohonen, T.1
  • 13
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Transactions on Information Systems Security 3 4 2000 227 261
    • (2000) ACM Transactions on Information Systems Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 14
    • 0035101723 scopus 로고    scopus 로고
    • Impact of network convergence on telecommunications software
    • DOI 10.1109/35.894380
    • S. Moyer, and A. Umar The impact of network convergence on telecommunications software Communications Magazine IEEE 39 no. 1 Jan 2001 78 84 10.1109/35.894380 (Pubitemid 32169379)
    • (2001) IEEE Communications Magazine , vol.39 , Issue.1 , pp. 78-84
    • Moyer, S.1    Umar, A.2
  • 19
    • 0442296744 scopus 로고    scopus 로고
    • A Bayesian paradigm for designing intrusion detection systems
    • DOI 10.1016/S0167-9473(03)00177-4
    • S.L. Scott A Bayesian paradigm for designing intrusion detection systems Computational Statistics and Data Analysis Journal 45 1 2004 69 83 (Pubitemid 38188003)
    • (2004) Computational Statistics and Data Analysis , vol.45 , Issue.1 , pp. 69-83
    • Scott, S.L.1
  • 23
    • 70450078363 scopus 로고    scopus 로고
    • Spam detection in voice-over-IP calls through semi-supervised clustering
    • DSN '09. IEEE/IFIP International Conference on
    • Yu-Sung Wu, S. Bagchi, N. Singh, and R. Wita Spam detection in voice-over-IP calls through semi-supervised clustering Dependable Systems & Networks 2009 307 316 DSN '09. IEEE/IFIP International Conference on
    • (2009) Dependable Systems & Networks , pp. 307-316
    • Wu, Y.-S.1    Bagchi, S.2    Singh, N.3    Wita, R.4
  • 24
    • 47849119609 scopus 로고    scopus 로고
    • VoIP security and privacy threat taxonomy
    • Jonathan Zar VoIP security and privacy threat taxonomy VoIP Security Alliance 2005
    • (2005) VoIP Security Alliance
    • Zar, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.