메뉴 건너뛰기




Volumn , Issue , 2012, Pages 253-260

On network intrusion detection for deployment in the wild

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY-BASED INTRUSION DETECTION; CHANGING ENVIRONMENT; DETECTING ATTACKS; DETECTION SCHEME; DETECTION SYSTEM; EMBEDDED PLATFORMS; EXISTING SYSTEMS; INTRUSION DETECTION SCHEME; MANAGEMENT COMPLEXITY; MANAGEMENT TASKS; NETWORK INTRUSION DETECTION; NETWORK OPERATIONS; NETWORK-BASED ATTACKS; NETWORKED SYSTEMS; PLUG-AND-PLAY; PROCESSING SPEED; REAL-TIME TRAINING; RELIABLE OPERATION; SECURITY FEATURES; SECURITY MEASURE; STAND-ALONE DEVICES; TRAINING DATA SETS;

EID: 84864247466     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NOMS.2012.6211906     Document Type: Conference Paper
Times cited : (9)

References (19)
  • 2
    • 62849093564 scopus 로고    scopus 로고
    • Experiences with emerald to date
    • P. G. Neumann and P. A. Poras, "Experiences with emerald to date," in RAID 1999.
    • (1999) RAID
    • Neumann, P.G.1    Poras, P.A.2
  • 7
    • 4143149628 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • Kluwer
    • E. Eskin, A. Arnold, M. Prerau, L. Portnor, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Data Mining for Security App., Kluwer, 2002.
    • (2002) Data Mining for Security App.
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnor, L.4    Stolfo, S.5
  • 9
    • 34548720822 scopus 로고    scopus 로고
    • An application of principal component analysis to the detection and visualization of computer network attacks
    • Nov./Dec.
    • K. Labib and V. R. Vemuri, "An application of principal component analysis to the detection and visualization of computer network attacks," Annals of Telecomm., Nov./Dec. 2005.
    • (2005) Annals of Telecomm.
    • Labib, K.1    Vemuri, V.R.2
  • 11
    • 0242456143 scopus 로고    scopus 로고
    • Nate- Network analysis of anomolous traffic events, a low cost approach
    • C. Taylor and J. Alves-Foss, "Nate- network analysis of anomolous traffic events, a low cost approach," in NSPW 2001.
    • NSPW 2001
    • Taylor, C.1    Alves-Foss, J.2
  • 12
    • 35348910615 scopus 로고    scopus 로고
    • Anagram: A content anomaly detector resistant to mimicry attack
    • K. Wang, J. J. Parekh, and S. J. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack," in RAID 2006.
    • RAID 2006
    • Wang, K.1    Parekh, J.J.2    Stolfo, S.J.3
  • 17
    • 76649142367 scopus 로고    scopus 로고
    • Protecting a moving target: Addressing web application concept drift
    • F. Maggi, W. Robertson, C. Kruegel, and G. Vigna, "Protecting a moving target: Addressing web application concept drift," in RAID 2009.
    • RAID 2009
    • Maggi, F.1    Robertson, W.2    Kruegel, C.3    Vigna, G.4
  • 19
    • 84864211594 scopus 로고    scopus 로고
    • LinkLogger, http://www.linklogger.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.