메뉴 건너뛰기




Volumn , Issue , 2012, Pages 403-410

Network anomaly detection using co-clustering

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS DETECTIONS; ANOMALY DETECTION; CO-CLUSTERING; DATA SET; FRAUDSTERS; INFORMATION AND COMMUNICATION; INTERNET ARCHITECTURE; INTERNET ATTACKS; INTERNET SECURITY; NETWORK ANOMALY DETECTION; SERVICE PROVIDER; SOCIAL NETWORKS; SPAMMERS; SYSTEM ADMINISTRATORS; UNSUPERVISED METHOD;

EID: 84874258387     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ASONAM.2012.72     Document Type: Conference Paper
Times cited : (34)

References (27)
  • 3
    • 84873162719 scopus 로고    scopus 로고
    • K-means algorithm, wikipedia. http://en.wikipedia.org/wiki/K- meansclustering.
    • K-means Algorithm
  • 4
    • 33847164386 scopus 로고    scopus 로고
    • Kdd 99 cup dataset. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html.
    • Kdd 99 Cup Dataset
  • 13
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • USENIX Association
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proceedings of the 17th conference on Security symposium, pages 139-154. USENIX Association, 2008.
    • (2008) Proceedings of the 17th Conference on Security Symposium , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 17
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • Australian Computer Society, Inc
    • K. Leung and C. Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proceedings of the Twenty-eighth Australasian conference on Computer Science-Volume 38, pages 333- 342. Australian Computer Society, Inc., 2005.
    • (2005) Proceedings of the Twenty-eighth Australasian Conference on Computer Science , vol.38 , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 20
    • 0028430224 scopus 로고
    • Network intrusion detection
    • IEEE
    • B. Mukherjee, L.T. Heberlein, and K.N. Levitt. Network intrusion detection. Network, IEEE, 8(3):26-41, 1994.
    • (1994) Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, L.T.2    Levitt, K.N.3
  • 23
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha and J.M. Park. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12):3448-3470, 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.