메뉴 건너뛰기




Volumn 9, Issue 2, 2012, Pages 128-141

Autonomic parameter tuning of anomaly-based IDSs: An SSH case study

Author keywords

anomalies; Autonomic; intrusion detection; network management; parameter optimization

Indexed keywords

ANOMALIES; ANOMALY-BASED INTRUSION DETECTION; AUTONOMIC; DETECTION SYSTEM; FALSE ALARMS; FALSE POSITIVE RATES; NETWORK BEHAVIORS; NETWORK TRAFFIC; NUMBER OF FALSE ALARMS; PARAMETER OPTIMIZATION; PARAMETER-TUNING; TRUE POSITIVE RATES;

EID: 84862147735     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2012.031512.110146     Document Type: Article
Times cited : (22)

References (41)
  • 8
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," Computer Commun., vol. 29, no. 9, pp. 1433-1442, 2006.
    • (2006) Computer Commun. , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 9
    • 49549120416 scopus 로고    scopus 로고
    • An adaptive automatically tuning intrusion detection system
    • Z. Yu, J. J. P. Tsai, and T. Weigert, "An adaptive automatically tuning intrusion detection system," ACM Trans. Auton. Adapt. Syst., vol. 3, pp. 1-25, 2008.
    • (2008) ACM Trans. Auton. Adapt. Syst. , vol.3 , pp. 1-25
    • Yu, Z.1    Tsai, J.J.P.2    Weigert, T.3
  • 11
    • 77956385147 scopus 로고    scopus 로고
    • An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm
    • Y. Himura, K. Fukuda, K. Cho, and H. Esaki, "An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm," Int. J. Netw. Manag., vol. 20, pp. 295-316, 2010.
    • Int. J. Netw. Manag , vol.20 , Issue.2010 , pp. 295-316
    • Himura, Y.1    Fukuda, K.2    Cho, K.3    Esaki, H.4
  • 12
    • 0033727064 scopus 로고    scopus 로고
    • Adaptive/automated detection of service anomalies in transaction-oriented wans: Network analysis, algorithms, implementation, and deployment
    • L. Ho, D. Cavuto, S. Papavassiliou, and A. Zawadzki, "Adaptive/ automated detection of service anomalies in transaction-oriented WANS: network analysis, algorithms, implementation, and deployment," IEEE J. Sel. Areas Commun., vol. 18, no. 5, pp. 744-757, 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.5 , pp. 744-757
    • Ho, L.1    Cavuto, D.2    Papavassiliou, S.3    Zawadzki, A.4
  • 13
    • 0032154135 scopus 로고    scopus 로고
    • Proactive anomaly detection using distributed intelligent agents
    • M. Thottan and C. Ji, "Proactive anomaly detection using distributed intelligent agents," IEEE Network, vol. 12, pp. 21-27, 1998. (Pubitemid 128570724)
    • (1998) IEEE Network , vol.12 , Issue.5 , pp. 21-27
    • Thottan, M.1    Ji, C.2
  • 14
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • -, "Anomaly detection in IP networks," IEEE Trans. Signal Process., vol. 51, pp. 2191-2204, 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , pp. 2191-2204
  • 15
    • 26844453653 scopus 로고    scopus 로고
    • Load characterization, overload prediction, and load anomaly detection for voice over ip traffic
    • M. Mandjes, I. Saniee, and A. Stolyar, "Load characterization, overload prediction, and load anomaly detection for voice over IP traffic," IEEE Trans. Neural Networks, vol. 16, no. 5, pp. 1019-1028, 2005.
    • (2005) IEEE Trans. Neural Networks , vol.16 , Issue.5 , pp. 1019-1028
    • Mandjes, M.1    Saniee, I.2    Stolyar, A.3
  • 20
    • 33747009728 scopus 로고    scopus 로고
    • Changepoint detection in multichannel and distributed systems with applications
    • A. Tartakovsky and V. Veeravalli, "Changepoint detection in multichannel and distributed systems with applications," Applications of Sequential Methodologies, pp. 331-363, 2004.
    • (2004) Applications of Sequential Methodologies , pp. 331-363
    • Tartakovsky, A.1    Veeravalli, V.2
  • 23
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • T. Nguyen and G. Armitage, "A survey of techniques for Internet traffic classification using machine learning," IEEE Commun. Surveys Tutorials, vol. 10, no. 4, pp. 56-76, 2008.
    • (2008) IEEE Commun. Surveys Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.1    Armitage, G.2
  • 24
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • DOI 10.1145/1064212.1064220, SIGMETRICS 2005: International Conference on Measurement and Modeling of Computer Systems - Proceedings
    • A. W. Moore and D. Zuev, "Internet traffic classification using Bayesian analysis techniques," SIGMETRICS Perform. Eval. Rev., vol. 33, pp. 50-60, 2005. (Pubitemid 43275409)
    • (2005) Performance Evaluation Review , vol.33 , Issue.1 , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 27
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains
    • L. E. Baum, T. Petrie, G. Soules, and N. Weiss, "A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains," Annals of Mathematical Statistics, vol. 41, no. 1, pp. 164-171, 1970.
    • (1970) Annals of Mathematical Statistics , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.E.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 28
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 38
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," Annales des Telecommunications, vol. 55, no. 7-8, pp. 361-378, 2000.
    • (2000) Annales des Telecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 39
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to roc analysis
    • T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Lett., vol. 27, no. 8, pp. 861-874, 2006.
    • (2006) Pattern Recognition Lett. , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.