메뉴 건너뛰기




Volumn 6961 LNCS, Issue , 2011, Pages 142-160

Cross-domain collaborative anomaly detection: So far yet so close

Author keywords

Anomaly Detection; Attacks; Collaborative Security; Defenses; Intrusion Detection; Web Security

Indexed keywords

ANOMALY DETECTION; ATTACKS; COLLABORATIVE SECURITY; DEFENSES; WEB SECURITY;

EID: 84857332705     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23644-0_8     Document Type: Conference Paper
Times cited : (21)

References (35)
  • 3
    • 0014814325 scopus 로고
    • Space/time trade-offs in Hash Coding with Allowable Errors
    • Bloom, B.H.: Space/time trade-offs in Hash Coding with Allowable Errors. Communications of the ACM 13(7), 422-426 (1970)
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 6
    • 76649108863 scopus 로고    scopus 로고
    • Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
    • Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
    • Cretu-Ciocarlie, G., Stavrou, A., Locasto, M., Stolfo, S.: Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 41-60. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 41-60
    • Cretu-Ciocarlie, G.1    Stavrou, A.2    Locasto, M.3    Stolfo, S.4
  • 13
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Soviet Physics Doklady 10(8), 707-710 (1966);
    • (1966) Soviet Physics Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.I.1
  • 15
    • 68849119999 scopus 로고    scopus 로고
    • Using string matching for deep packet inspection
    • Lin, P., Lin, Y., Lee, T., Lai, Y.: Using string matching for deep packet inspection. Computer 41(4), 23-28 (2008)
    • (2008) Computer , vol.41 , Issue.4 , pp. 23-28
    • Lin, P.1    Lin, Y.2    Lee, T.3    Lai, Y.4
  • 21
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Sommer, R., Paxson, V.: Outside the closed world: On using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy, pp. 305-316 (2010)
    • (2010) IEEE Symposium on Security and Privacy , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 29
    • 76649131237 scopus 로고    scopus 로고
    • Regular expression matching on graphics hardware for intrusion detection
    • Balzarotti, D. (ed.) RAID 2009. Springer, Heidelberg
    • Vasiliadis, G., Polychronakis,M., Antonatos, S.,Markatos, E., Ioannidis, S.: Regular expression matching on graphics hardware for intrusion detection. In: Balzarotti, D. (ed.) RAID 2009. LNCS, vol. 5758, pp. 265-283. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5758 , pp. 265-283
    • Vasiliadis, G.1    Polychronakis, M.2    Antonatos, S.3    Markatos, E.4    Ioannidis, S.5
  • 32
    • 84857332734 scopus 로고    scopus 로고
    • Websense: LizaMoon, http://community.websense.com/blogs/securitylabs/ archive/2011/03/31/update-on-lizamoon-mass-injection.aspx
    • LizaMoon
  • 33
    • 33746644985 scopus 로고    scopus 로고
    • Privacy-preserving alert correlation: A concept hierarchy based approach
    • December
    • Xu, D., Ning, P.: Privacy-preserving alert correlation: a concept hierarchy based approach. In: 21st Annual Computer Security Applications Conference, pp. 10-546 (December 2005)
    • (2005) 21st Annual Computer Security Applications Conference , pp. 10-546
    • Xu, D.1    Ning, P.2
  • 34
    • 85137546697 scopus 로고    scopus 로고
    • Global Intrusion Detection in the DOMINO Overlay System
    • Yegneswaran, V., Barford, P., Jha, S.: Global Intrusion Detection in the DOMINO Overlay System. In: NDSS (2004)
    • (2004) NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.