메뉴 건너뛰기




Volumn 56, Issue 12, 2012, Pages 2805-2831

An orchestration approach for unwanted Internet traffic identification

Author keywords

Alert correlation; Dempster Shafer Theory; Frequent episodes discovery; Orchestration; Unwanted Internet traffic

Indexed keywords

ALERT CORRELATION; DEMPSTER-SHAFER THEORY; FREQUENT EPISODES; INTERNET TRAFFIC; ORCHESTRATION;

EID: 84863616826     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2012.04.018     Document Type: Article
Times cited : (13)

References (87)
  • 1
    • 84878671343 scopus 로고    scopus 로고
    • CSI, Computer Security Institute
    • CSI, Computer Security Institute. < http://www.gocsi.com >.
  • 5
    • 84878670581 scopus 로고    scopus 로고
    • Gartner, Gartner
    • Gartner, Gartner. < http://www.gartner.com >.
  • 11
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C.V. Zhou, C. Leckie, and S. Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computer & Security 29 1 2010 124 140
    • (2010) Computer & Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 23
    • 84878671936 scopus 로고    scopus 로고
    • Force10 Networks
    • Force10 Networks, P-Series Overview, 2008. < http://www. force10networks.com/products/pseries.asp >.
    • (2008) P-Series Overview
  • 24
    • 84878672647 scopus 로고    scopus 로고
    • OrcaFlow: Terabit-Class Network Traffic Anomaly Detection
    • Cetacea Networks, OrcaFlow: Terabit-Class Network Traffic Anomaly Detection, 2008. < http://www.orcaflow.ca/orcaflow-ca >.
    • (2008) Cetacea Networks
  • 25
    • 84878670243 scopus 로고    scopus 로고
    • CloudShield Technologies, Hardware Solutions
    • CloudShield Technologies, Hardware Solutions, 2008. < http://www.cloudshield.com/platform/hardware.asp.
    • (2008)
  • 26
    • 84878669999 scopus 로고    scopus 로고
    • Snort, 2009. < http://www.snort.org >.
    • (2009)
  • 27
    • 84878675233 scopus 로고    scopus 로고
    • NFS, Bro Intrusion Detection System
    • NFS, Bro Intrusion Detection System, 2009. < http://bro-ids.org >.
    • (2009)
  • 28
    • 84878674943 scopus 로고    scopus 로고
    • Prelude-IDS
    • Prelude-IDS Technologies, Prelude-IDS, 2009. < http://www.prelude-ids. com >.
    • (2009) Prelude-IDS Technologies
  • 29
    • 84878671266 scopus 로고    scopus 로고
    • Honeyd
    • N. Provos, Honeyd, 2009. < http://www.honeyd.org >.
    • (2009)
    • Provos, N.1
  • 30
    • 84878675439 scopus 로고    scopus 로고
    • Nephentes, 2009. < http://nepenthes.carnivore.it >.
    • (2009)
  • 31
    • 10244261530 scopus 로고    scopus 로고
    • EWMA forecast of normal system activity for computer intrusion detection
    • N. Ye, Q. Chen, and C.M. Borror EWMA forecast of normal system activity for computer intrusion detection IEEE Transactions on Reliability 53 4 2004 557 566
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.4 , pp. 557-566
    • Ye, N.1    Chen, Q.2    Borror, C.M.3
  • 34
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • DOI 10.1145/1090191.1080112
    • K. Xu, Z. Zhang, S. Bhattacharyya, Profiling Internet backbone traffic: behavior models and applications, in: 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '05), Philadelphia, Pennsylvania, USA, 2005, pp. 169-180. (Pubitemid 46323502)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 37
  • 38
    • 84888927134 scopus 로고    scopus 로고
    • Frequent episode rules for intrusive anomaly detection with internet data mining
    • M. Qin, K. Hwang, Frequent episode rules for intrusive anomaly detection with internet data mining, in: USENIX Security Symposium, 2004.
    • (2004) USENIX Security Symposium
    • Qin, M.1    Hwang, K.2
  • 40
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by a multivalued mapping
    • A.P. Dempster Upper and lower probabilities induced by a multivalued mapping Annals Mathematics Statistics 38 1967 325 339
    • (1967) Annals Mathematics Statistics , vol.38 , pp. 325-339
    • Dempster, A.P.1
  • 41
    • 0014171914 scopus 로고
    • Upper and lower probability inferences based on a sample from a finite univariate population
    • A.P. Dempster Upper and lower probability inferences based on a sample from a finite univariate population Biometrika 54 1967 515 528
    • (1967) Biometrika , vol.54 , pp. 515-528
    • Dempster, A.P.1
  • 43
    • 84878671851 scopus 로고    scopus 로고
    • Java Dempster Shafer Library
    • T. Reineking, Java Dempster Shafer Library, 2009. < http://sourceforge.net/projects/jds >.
    • (2009)
    • Reineking, T.1
  • 46
    • 84878671898 scopus 로고    scopus 로고
    • Emerging Threats, 2010. < http://www.emergingthreates.net >.
    • (2010) Emerging Threats
  • 47
    • 84878670551 scopus 로고    scopus 로고
    • Intrusense Packit
    • Intrusense Packit, Network injection and capture, 2010. < http://www.intrusense.com/software/packit >.
    • (2010) Network Injection and Capture
  • 48
    • 84878674948 scopus 로고    scopus 로고
    • Scapy
    • Scapy, 2010. < http://www.secdev.org/projects/scapy >.
    • (2010)
  • 49
    • 84857850323 scopus 로고    scopus 로고
    • Ha.ckers, Slowloris HTTP DoS, 2010. < http://ha.ckers.org/slowloris >.
    • (2010) Slowloris HTTP DoS
  • 50
    • 84863606984 scopus 로고    scopus 로고
    • Keeping DNS trustworthy
    • R. Hyatt Keeping DNS trustworthy ISSA Journal 2006 37 38
    • (2006) ISSA Journal , pp. 37-38
    • Hyatt, R.1
  • 52
    • 84878674749 scopus 로고    scopus 로고
    • Symantec, Outbreak alert: storm trojan, 2007. < http://www.symantec. com/outbreak/storm-trojan.html >.
    • (2007) Outbreak Alert: Storm Trojan
  • 60
    • 27644518127 scopus 로고    scopus 로고
    • D-WARD: A source-end defense against flooding denial-of-service attacks
    • DOI 10.1109/TDSC.2005.35
    • J. Mirkovic, and P. Reiher D-WARD: source-end defense against distributed denial-of-service attacks IEEE Transactions on Dependable and Secure Computing Archive 2 3 2005 216 232 (Pubitemid 41560432)
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 65
    • 44849134557 scopus 로고    scopus 로고
    • A global security architecture for intrusion detection on computer networks
    • A.K. Ganame, J. Bourgeoisa, R. Bidou, and F. Spiesa A global security architecture for intrusion detection on computer networks Computers & Security 27 2008 30 47
    • (2008) Computers & Security , vol.27 , pp. 30-47
    • Ganame, A.K.1    Bourgeoisa, J.2    Bidou, R.3    Spiesa, F.4
  • 66
    • 49949084678 scopus 로고    scopus 로고
    • Multi-agent reinforcement learning for intrusion detection
    • A. Servin, and D. Kudenko Multi-agent reinforcement learning for intrusion detection Lecture Notes in Computer Science 4865 2008 211 223
    • (2008) Lecture Notes in Computer Science , vol.4865 , pp. 211-223
    • Servin, A.1    Kudenko, D.2
  • 71
    • 84878672967 scopus 로고    scopus 로고
    • CAIDA
    • CAIDA, The CAIDA DDoS Attack 2007 Dataset, 2010. < http://www.caida.org/data/passive/ddos-20070804-dataset.xml >.
    • (2010) The CAIDA DDoS Attack 2007 Dataset
  • 72
    • 84940102146 scopus 로고    scopus 로고
    • UMASS Trace Repository
    • UMASS Trace Repository, UMASS Trace Repository, 2010. < http://trace.cs.umass.edu >.
    • (2010) UMASS Trace Repository
  • 77
    • 84878675649 scopus 로고    scopus 로고
    • W3C
    • W3C, WSDL W3C Recommendation, 2007. < http://www.w3.org/TR/wsdl20- primer >.
    • (2007) WSDL W3C Recommendation
  • 78
    • 45849141843 scopus 로고    scopus 로고
    • W3C
    • W3C, OWL W3C Recommendation, 2004. < http://www.w3.org/TR/owl-features >.
    • (2004) OWL W3C Recommendation
  • 84
    • 84878675192 scopus 로고    scopus 로고
    • A WS-based infrastructure for integrating intrusion detection systems in large-scale environments
    • J.E.M.S. Brandão, J.S. Fraga, P.M. Mafra, R.R. Obelheiro, A WS-based infrastructure for integrating intrusion detection systems in large-scale environments, in: CoopIS/DOA/ODBASE/GADA, 2006.
    • (2006) CoopIS/DOA/ODBASE/GADA
    • Brandão, J.E.M.S.1    Fraga, J.S.2    Mafra, P.M.3    Obelheiro, R.R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.