메뉴 건너뛰기




Volumn 14, Issue 6, 2012, Pages 339-351

AOCD: An adaptive outlier based coordinated scan detection approach

Author keywords

Coordinated scans; Outlier detection; Port scan; Principal component analysis

Indexed keywords

ADAPTIVE NETWORKS; COORDINATED ATTACK; COORDINATED SCANS; DATA SETS; DETECTION ACCURACY; DETECTION APPROACH; FALSE POSITIVE RATES; OUTLIER DETECTION; PORT SCANS; TARGET MACHINES;

EID: 84870694700     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (30)
  • 2
    • 0021583718 scopus 로고
    • FCM: The fuzzy c-means clustering algorithm
    • James C Bezdek, Robert Ehrlich, and William Full, "FCM: The fuzzy c-means clustering algorithm," Computers & Geosciences, vol. 10, no. 2-3, pp. 191-203, 1984.
    • (1984) Computers & Geosciences , vol.10 , Issue.2-3 , pp. 191-203
    • Bezdek, J.C.1    Ehrlich, R.2    Full, W.3
  • 4
    • 80053510589 scopus 로고    scopus 로고
    • Surveying port scans and their detection method-ologies
    • M H Bhuyan, D K Bhattacharyya, and J K Kalita, "Surveying port scans and their detection method-ologies," The Computer Journal, vol. 54, no. 10, pp. 1565-1581, 2011.
    • (2011) The Computer Journal , vol.54 , Issue.10 , pp. 1565-1581
    • Bhuyan, M.H.1    Bhattacharyya, D.K.2    Kalita, J.K.3
  • 7
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat land-scape: Challenges and future research directions
    • Kim Kwang Raymond Choo, "The cyber threat land-scape: Challenges and future research directions," Computers & Security, vol. 30, no. 8, pp. 719-731, 2011.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.K.R.1
  • 10
    • 84906789612 scopus 로고    scopus 로고
    • Idle port scanning and non-interference analysis of network protocol stacks using model checking
    • Berkeley, USA
    • Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall, "Idle port scanning and non-interference analysis of network protocol stacks using model checking," in Proceedings of the 19th USENIX conference on Security, pp. 1-17, Berkeley, USA, 2010.
    • (2010) Proceedings of the 19th USENIX conference on Security , pp. 1-17
    • Ensafi, R.1    Park, J.C.2    Kapur, D.3    Crandall, J.R.4
  • 11
    • 67650339498 scopus 로고    scopus 로고
    • Detecting scanners: Empirical assessment on 3g network
    • September
    • Vincenzo Falletta and Fabio Ricciato, "Detecting scanners: Empirical assessment on 3g network," International Journal of Network Security, vol. 9, pp. 143-155, September 2009.
    • (2009) International Journal of Network Security , vol.9 , pp. 143-155
    • Falletta, V.1    Ricciato, F.2
  • 13
    • 77956613687 scopus 로고    scopus 로고
    • A novel intrusion detection system based on hierarchical clustering and support vector machines
    • January
    • Shi Jinn Horng, Ming Yang Su, Yuan Hsin Chen, Tzong Wann Kao, Rong Jian Chen, Jui Lin Lai, and Citra Dwi Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines," Expert Systems with Applications, vol. 38, pp. 306-313, January 2011.
    • (2011) Expert Systems with Applications , vol.38 , pp. 306-313
    • Horng, S.J.1    Su, M.Y.2    Chen, Y.H.3    Kao, T.W.4    Chen, R.J.5    Lai, J.L.6    Perkasa, C.D.7
  • 14
    • 84872777701 scopus 로고    scopus 로고
    • Distributed information gathering
    • hybrid@hotmail.com Article 9
    • hybrid@hotmail.com, "Distributed information gathering," Phrack Magazine, Article 9, vol. 9, no. 55, 1999.
    • (1999) Phrack Magazine , vol.9 , Issue.55
  • 16
    • 84872800853 scopus 로고    scopus 로고
    • KDDCUP99. Winning strategy in kdd99 October 28
    • KDDCUP99. "Winning strategy in kdd99,". http://kdd.ics.uci.edu/databases/kddcup99/ kdd-cup99.html, October 28 1999.
    • (1999)
  • 17
    • 84872776077 scopus 로고    scopus 로고
    • A method for locating digital evidences with outlier de-tection using support vector machine
    • May
    • Zaiqiang Liu, Dongdai Lin, and Fengdeng Guo, "A method for locating digital evidences with outlier de-tection using support vector machine," International Journal of Network Security, vol. 6, pp. 301-308, May 2008.
    • (2008) International Journal of Network Security , vol.6 , pp. 301-308
    • Liu, Z.1    Lin, D.2    Guo, F.3
  • 18
    • 84872805805 scopus 로고    scopus 로고
    • Internet security. Wright State University
    • Prabhaker Mateti. "Internet security,". http://www.cs.wright.edu/pmateti/Internet-Security/Lectures/Probing/inde x.html. Wright State University.
    • Mateti, P.1
  • 19
    • 84858179622 scopus 로고    scopus 로고
    • Differential epidemic model of virus and worms in computer network
    • May
    • Bimal Kumar Mishra and Gholam Mursalin Ansari, "Differential epidemic model of virus and worms in computer network," International Journal of Net-work Security, vol. 14, pp. 149-155, May 2012.
    • (2012) International Journal of Net-work Security , vol.14 , pp. 149-155
    • Mishra, B.K.1    Ansari, G.M.2
  • 20
    • 84878080825 scopus 로고    scopus 로고
    • An efficient reference-based approach to outlier detection in large datasets
    • Washington, USA, IEEE CS
    • Yaling Pei, Osmar R Zaiane, and Yong Gao, "An efficient reference-based approach to outlier detection in large datasets," in Proceedings of the Sixth Inter-national Conference on Data Mining, pp. 478-487, Washington, USA, 2006. IEEE CS.
    • (2006) Proceedings of the Sixth Inter-national Conference on Data Mining , pp. 478-487
    • Pei, Y.1    Zaiane, O.R.2    Gao, Y.3
  • 30
    • 78049530653 scopus 로고    scopus 로고
    • An observation-centric analysis on the modeling of anomaly-based intrusion detection
    • May
    • Zonghua Zhang, Hong Shen, and Yingpeng Sang, "An observation-centric analysis on the modeling of anomaly-based intrusion detection," International Journal of Network Security, vol. 4, pp. 292-305, May 2007.
    • (2007) International Journal of Network Security , vol.4 , pp. 292-305
    • Zhang, Z.1    Shen, H.2    Sang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.