메뉴 건너뛰기




Volumn , Issue , 2012, Pages 104-112

User intention-based traffic dependence analysis for anomaly detection

Author keywords

Anomaly detection; Dependence; Network traffic; User behaviors

Indexed keywords

ANOMALOUS EVENTS; ANOMALY DETECTION; DEPENDENCE; DEPENDENCE ANALYSIS; EXPERIMENTAL EVALUATION; FALSE ALARMS; FRAMEWORK AND ALGORITHMS; MALICIOUS CODES; NETWORK TRAFFIC; SPY-WARE; STORAGE REQUIREMENTS; USER ACTION; USER ACTIVITY; USER BEHAVIORS;

EID: 84864242247     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SPW.2012.15     Document Type: Conference Paper
Times cited : (21)

References (32)
  • 3
    • 84864224145 scopus 로고    scopus 로고
    • Top 10 Blocked URLs and Domains. http://us.trendmicro.com/us/trendwatch/ current-threat-activity/malicious-url-info/top10-blocked-urls-domains/.
    • Top 10 Blocked URLs and Domains
  • 9
    • 58049219641 scopus 로고    scopus 로고
    • Mining specifications of malicious behavior
    • G. Shroff, P. Jalote, and S. K. Rajamani, editors, ACM
    • M. Christodorescu, S. Jha, and C. Kruegel. Mining specifications of malicious behavior. In G. Shroff, P. Jalote, and S. K. Rajamani, editors, ISEC, pages 5-14. ACM, 2008.
    • (2008) ISEC , pp. 5-14
    • Christodorescu, M.1    Jha, S.2    Kruegel, C.3
  • 14
    • 73849140516 scopus 로고    scopus 로고
    • Preventing history forgery with secure provenance
    • R. Hasan, R. Sion, and M. Winslett. Preventing history forgery with secure provenance. TOS, 5(4), 2009.
    • (2009) TOS , vol.5 , Issue.4
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 17
    • 51849103380 scopus 로고    scopus 로고
    • Using dependency tracking to provide explanations for policy management
    • L. Kagal, C. Hanson, and D. J. Weitzner. Using dependency tracking to provide explanations for policy management. In POLICY, pages 54-61, 2008.
    • (2008) POLICY , pp. 54-61
    • Kagal, L.1    Hanson, C.2    Weitzner, D.J.3
  • 19
    • 80053902649 scopus 로고    scopus 로고
    • Discovering excitatory relationships using dynamic bayesian networks
    • 10.1007/s10115-010-0344-6
    • D. Patnaik, S. Laxman, and N. Ramakrishnan. Discovering excitatory relationships using dynamic bayesian networks. Knowledge and Information Systems, pages 1-31, 2010. 10.1007/s10115-010-0344-6.
    • (2010) Knowledge and Information Systems , pp. 1-31
    • Patnaik, D.1    Laxman, S.2    Ramakrishnan, N.3
  • 26
    • 0024984441 scopus 로고
    • Adaptive real-time anomaly detection using inductively generated sequential patterns
    • H. S. Teng, K. Chen, and S. C.-Y. Lu. Adaptive real-time anomaly detection using inductively generated sequential patterns. Security and Privacy, IEEE Symposium on, 0:278, 1990.
    • (1990) Security and Privacy, IEEE Symposium on , vol.0 , pp. 278
    • Teng, H.S.1    Chen, K.2    Lu, S.C.-Y.3
  • 31
    • 32344440051 scopus 로고    scopus 로고
    • Reasoning about sets using redescription mining
    • R. Grossman, R. J. Bayardo, and K. P. Bennett, editors, ACM
    • M. J. Zaki and N. Ramakrishnan. Reasoning about sets using redescription mining. In R. Grossman, R. J. Bayardo, and K. P. Bennett, editors, KDD, pages 364-373. ACM, 2005.
    • (2005) KDD , pp. 364-373
    • Zaki, M.J.1    Ramakrishnan, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.