메뉴 건너뛰기




Volumn 3, Issue 3, 2011, Pages 226-239

Survey on incremental approaches for network anomaly detection

Author keywords

Anomaly detection; Attack; Clustering; Incremental

Indexed keywords


EID: 84859514765     PISSN: 20760930     EISSN: 2073607X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (30)

References (56)
  • 3
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • August 22, [Online]
    • A. Patcha and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks (Elsevier Science), vol. 51, no. 12, pp. 3448-3470, August 22, 2007. [Online].Available: http://10.1016/j.comnet.2007.02.001
    • (2007) Computer Networks (Elsevier Science) , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 4
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • Purdue University, West Lafayette, IN, USA, Tech. Rep. CSD-TR-94-013, June 17
    • S. Kumar and E. H. Spafford, "An application of pattern matching in intrusion detection," The COAST Project, Department of Computer Sciences, Purdue University, West Lafayette, IN, USA, Tech. Rep. CSD-TR-94-013, June 17, 1994.
    • (1994) The COAST Project, Department of Computer Sciences
    • Kumar, S.1    Spafford, E.H.2
  • 5
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • July, [Online]
    • V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, July 2009. [Online]. Available: http://doi.acm.org/10.1145/1541880.1541882
    • (2009) ACM Computing Surveys , vol.41 , Issue.3 , pp. 1-58
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 6
    • 30644460786 scopus 로고    scopus 로고
    • Intrusion detection in computer networks by multiple classifier systems
    • Los Alamitos, CA USA: IEEE CS
    • G. Giacinto and F. Roli, "Intrusion detection in computer networks by multiple classifier systems," in Proceedings of Int'nl Conference on Pattern Recognition. Los Alamitos, CA, USA: IEEE CS, pp. 390-293, 2002.
    • (2002) Proceedings of Int'nl Conference on Pattern Recognition , pp. 390-293
    • Giacinto, G.1    Roli, F.2
  • 9
    • 1642475063 scopus 로고    scopus 로고
    • Resampling approach for anomaly detection in multispectral images
    • J. Theiler and D. M. Cai, "Resampling approach for anomaly detection in multispectral images," in Proc. SPIE, pp. 230-240, 2003.
    • (2003) Proc, SPIE , pp. 230-240
    • Theiler, J.1    Cai, D.M.2
  • 10
    • 84859505906 scopus 로고    scopus 로고
    • tcpdump. [Online]
    • V. Jacobson, C. Leres, and S. McCanne, "tcpdump." [Online]. Available: ftp://ftp.ee.lbl.gov/tcpdump.tar.gz
    • Jacobson, V.1    Leres, C.2    McCanne, S.3
  • 12
    • 85077206746 scopus 로고
    • The bsd packet filter: A new architecture for user level packet capture
    • USENIX Association, January
    • S. McCanne and V. Jacobson, "The bsd packet filter: A new architecture for user level packet capture," in Proceedings of the Winter 1993 USENIX Conference, USENIX Association, January, pp. 259-269, 1993.
    • (1993) Proceedings of the Winter 1993 USENIX Conference , pp. 259-269
    • McCanne, S.1    Jacobson, V.2
  • 13
    • 84883271942 scopus 로고    scopus 로고
    • Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets
    • Security and Trust, October
    • H. G. Kayacik, A. N. Zincir-Heywood, and M. I. Heywood, "Selecting features for intrusion detection: A feature relevance analysis on kdd 99 intrusion detection datasets," in Proceedings of the Third Annual Conference on Privacy, Security and Trust, October, pp. 1-6, 2005.
    • (2005) Proceedings of the Third Annual Conference on Privacy , pp. 1-6
    • Kayacik, H.G.1    Zincir-Heywood, A.N.2    Heywood, M.I.3
  • 14
    • 84859494337 scopus 로고    scopus 로고
    • Kdd cup 1999 data. October. Online
    • "Kdd cup 1999 data," October 1999. [Online]. Available:http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
    • (1999)
  • 17
    • 0035698177 scopus 로고    scopus 로고
    • Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model
    • Washington, DC, USA: IEEE Computer Society
    • C. Spence, L. Parra, and P. Sajda, "Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model," in Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. Washington, DC, USA: IEEE Computer Society, 2001, p. 3-10.
    • (2001) Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis , pp. 3-10
    • Spence, C.1    Parra, L.2    Sajda, P.3
  • 20
    • 70349687675 scopus 로고
    • On discordant observations
    • F. Y. Edgeworth, "On discordant observations," Philosophical Magazine, vol. 23, no. 5, pp. 364-375, 1887.
    • (1887) Philosophical Magazine , vol.23 , Issue.5 , pp. 364-375
    • Edgeworth, F.Y.1
  • 21
    • 33947697162 scopus 로고    scopus 로고
    • Conditional anomaly detection
    • [Online]
    • X. Song, M. Wu, C. Jermaine, and S. Ranka, "Conditional anomaly detection," IEEE Trans. on Knowl. and Data Eng., vol. 19, no. 5, pp. 631-645, 2007. [Online]. Available: http://dx.doi.org/10.1109/TKDE.2007.1009
    • (2007) IEEE Trans. on Knowl. and Data Eng. , vol.19 , Issue.5 , pp. 631-645
    • Song, X.1    Wu, M.2    Jermaine, C.3    Ranka, S.4
  • 22
    • 58349122797 scopus 로고    scopus 로고
    • Ph.D. dissertation, The University of New South Wales, November
    • A. Prayote, "Knowledge based anomaly detection," Ph.D. dissertation, The University of New South Wales, November 2007.
    • (2007) Knowledge based anomaly detection
    • Prayote, A.1
  • 24
    • 84941155240 scopus 로고
    • Well separated clusters and optimal fuzzy partitions
    • [Online]
    • J. C. Dunn, "Well separated clusters and optimal fuzzy partitions," Journal of Cybernetics, vol. 4, no. 1, pp. 95-104., 1974. [Online]. Available: http://10.1080/01969727408546059
    • (1974) Journal of Cybernetics , vol.4 , Issue.1 , pp. 95-104
    • Dunn, J.C.1
  • 26
    • 70349266356 scopus 로고    scopus 로고
    • Comprehensive survey on distance/similarity measures between probability density functions
    • November
    • S. H. Cha, "Comprehensive survey on distance/similarity measures between probability density functions," International Journal of Mathematical Models and Methods in Applied Science, vol. 1, no. 4, pp. 300-307, November, 2007.
    • (2007) International Journal of Mathematical Models and Methods in Applied Science , vol.1 , Issue.4 , pp. 300-307
    • Cha, S.H.1
  • 28
    • 67649946388 scopus 로고    scopus 로고
    • An incremental-learning method for supervised anomaly detection by cascading service classifier and ITI decision tree methods
    • Berlin, Heidelberg: Springer-Verlag, Online
    • W. Y. Yu and H.-M. Lee, "An incremental-learning method for supervised anomaly detection by cascading service classifier and ITI decision tree methods," in Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 155-160. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-01393-5 17
    • (2009) Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics , pp. 155-160
    • Yu, W.Y.1    Lee, H.-M.2
  • 29
    • 33745777639 scopus 로고    scopus 로고
    • Incremental support vector learning: Analysis, implementation and applications
    • P. Laskov, C. Gehl, S. Krüger, and K.-R. Müller, "Incremental support vector learning: Analysis, implementation and applications," Journal of Machine Learning Research, vol. 7, pp. 1909-1936, 2006.
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 1909-1936
    • Laskov, P.1    Gehl, C.2    Krüger, S.3    Müller, K.-R.4
  • 32
    • 0030157145 scopus 로고    scopus 로고
    • BIRCH: an efficient data clustering method for very large databases
    • [Online]
    • T. Zhang, R. Ramakrishnan, and M. Livny, "BIRCH: an efficient data clustering method for very large databases," SIGMOD Rec., vol. 25, no. 2, pp. 103-114, 1996. [Online]. Available: http://doi.acm.org/10.1145/235968.233324
    • (1996) SIGMOD Rec. , vol.25 , Issue.2 , pp. 103-114
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3
  • 33
    • 78449264726 scopus 로고    scopus 로고
    • Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers
    • Springer Berlin Heidelberg, November 23, Online
    • A. Rasoulifard, A. G. Bafghi, and M. Kahani, Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers, in Communications in Computer and Information Science. Springer Berlin Heidelberg, November 23 2008, vol. 6, pp. 577-584. [Online]. Available: http://10.1007/978-3-540-89985-3
    • (2008) Communications in Computer and Information Science , vol.6 , pp. 577-584
    • Rasoulifard, A.1    Bafghi, A.G.2    Kahani, M.3
  • 34
    • 34249731961 scopus 로고    scopus 로고
    • Adaptive real-time anomaly detection with incremental clustering
    • [Online]
    • K. Burbeck and S. Nadjm-Tehrani, "Adaptive real-time anomaly detection with incremental clustering," Inf. Secur. Tech. Rep., vol. 12, no. 1, pp. 56-67, 2007. [Online]. Available: http://dx.doi.org/10.1016/j.istr.2007.02.004
    • (2007) Inf. Secur. Tech. Rep. , vol.12 , Issue.1 , pp. 56-67
    • Burbeck, K.1    Nadjm-Tehrani, S.2
  • 35
    • 63149114320 scopus 로고    scopus 로고
    • Incremental clustering algorithm for intrusion detection using clonal selection
    • Washington, DC, USA: IEEE Computer Societ [Online]
    • C. Zhong and N. Li, "Incremental clustering algorithm for intrusion detection using clonal selection," in Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application. Washington, DC, USA: IEEE Computer Society, 2008, pp. 326-331. [Online]. Available: http://dx.doi.org/10.1109/PACIIA.2008.256
    • (2008) Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application , pp. 326-331
    • Zhong, C.1    Li, N.2
  • 36
    • 44949114202 scopus 로고    scopus 로고
    • Incremental clustering of mixed data based on distance hierarchy
    • [Online]
    • C. C. Hsu and Y.-P. Huang, "Incremental clustering of mixed data based on distance hierarchy," Expert Syst. Appl., vol. 35, no. 3, pp. 1177-1185, 2008. [Online]. Available: http://dx.doi.org/10.1016/j.eswa.2007.08.049
    • (2008) Expert Syst. Appl. , vol.35 , Issue.3 , pp. 1177-1185
    • Hsu, C.C.1    Huang, Y.-P.2
  • 37
    • 4544221622 scopus 로고    scopus 로고
    • A novel clustering method with network structure based on clonal algorithm. in Proceedings of International Conference on Acoustics, Speech, and Signal Processing. Piscataway
    • J. Li, X. Gao, and L. Jiao, "A novel clustering method with network structure based on clonal algorithm," in Proceedings of International Conference on Acoustics, Speech, and Signal Processing. Piscataway, NJ: IEEE Press, 2004, pp. 793-796.
    • (2004) NJ: IEEE Press , pp. 793-796
    • Li, J.1    Gao, X.2    Jiao, L.3
  • 42
    • 84859511357 scopus 로고    scopus 로고
    • Ph.D. dissertation, Computer Science Department, University of Colorado, Colorado Springs
    • L. Delooze, "Applying soft-computing techniques to intrusion detection," Ph.D. dissertation, Computer Science Department, University of Colorado, Colorado Springs, 2005.
    • (2005) Applying soft-computing techniques to intrusion detection
    • Delooze, L.1
  • 44
    • 33847256529 scopus 로고    scopus 로고
    • The devil and packet trace anonymization
    • [Online]
    • R. Pang, M. Allman, V. Paxson, and J. Lee, "The devil and packet trace anonymization," SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 29-38, 2006. [Online]. Available: http://doi.acm.org/10.1145/1111322.1111330
    • (2006) SIGCOMM Comput. Commun. Rev. , vol.36 , Issue.1 , pp. 29-38
    • Pang, R.1    Allman, M.2    Paxson, V.3    Lee, J.4
  • 48
    • 84859495827 scopus 로고    scopus 로고
    • Online. 1597
    • S. F. Bacon, 1597. [Online]. Available: http://www.quotationspage.com/quote/2060.html
    • Bacon, S.F.1
  • 49
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Transactions on Information and System Security, vol. 3, no. 3, pp. 186-205, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 51
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh, "Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 55
    • 79952932462 scopus 로고    scopus 로고
    • NADO: Network anomaly detection using outlier approach
    • February
    • M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "NADO: Network anomaly detection using outlier approach," in ICCCS'11. ACM, February 2011, pp. 531-536.
    • (2011) ICCCS'11. ACM , pp. 531-536
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 56
    • 79951581599 scopus 로고    scopus 로고
    • Incremental SVM based on reserved set for network intrusion detection
    • June, USA
    • Y. Yi, J. Wu and W. Xu. "Incremental SVM based on reserved set for network intrusion detection" Journal of Expert Systems with Applications, Vol. 38, No. 6, pp. 7698-7707, June, 2011. USA
    • (2011) Journal of Expert Systems with Applications , vol.38 , Issue.6 , pp. 7698-7707
    • Yi, Y.1    Wu, J.2    Xu, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.