메뉴 건너뛰기




Volumn 7754, Issue , 2013, Pages 148-183

A methodological overview on anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

QUALITY OF SERVICE;

EID: 84875951216     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36784-7_7     Document Type: Review
Times cited : (32)

References (104)
  • 2
    • 84875943831 scopus 로고    scopus 로고
    • data
    • Kdd cup (1999), data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
    • (1999) Kdd cup
  • 5
    • 70349684725 scopus 로고    scopus 로고
    • Seven years and one day: Sketching the evolution of internet traffic
    • April
    • Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K.: Seven years and one day: Sketching the evolution of internet traffic. In: INFOCOM (April 2009
    • (2009) INFOCOM
    • Borgnat, P.1    Dewaele, G.2    Fukuda, K.3    Abry, P.4    Cho, K.5
  • 6
    • 62849107731 scopus 로고    scopus 로고
    • Efficient intrusion detection using principal component analysis
    • La Londe, France, Juin, RSM-D'ept. R'eseaux, S'ecurit'e et Multim'edia (Institut T'el'ecom-T'el'ecom Bretagne
    • Bouzida, Y., Cuppens, F., Cuppens-Boulahia, N.A., Gombault, S.N.: Efficient intrusion detection using principal component analysis. In: 3̀eme Conf'erence sur la S'ecurit'e et Architectures R'eseaux, La Londe, France, Juin, RSM-D'ept. R'eseaux, S'ecurit'e et Multim'edia (Institut T'el'ecom-T'el'ecom Bretagne) (2004
    • (2004) 3Eme Conf'erence sur la S'ecurit'e et Architectures R'eseaux
    • Bouzida, Y.1    Cuppens, F.2    Cuppens-Boulahia, N.A.3    Gombault, S.N.4
  • 14
    • 51849117294 scopus 로고    scopus 로고
    • Application of wavelet packet transform to network anomaly detection
    • Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds. Springer, Heidelberg
    • Callegari, C., Giordano, S., Pagano, M.: Application of Wavelet Packet Transform to Network Anomaly Detection. In: Balandin, S., Moltchanov, D., Koucheryavy, Y. (eds.) NEW2AN 2008. LNCS, vol. 5174, pp. 246-257. Springer, Heidelberg (2008
    • (2008) NEW2AN 2008. LNCS , vol.5174 , pp. 246-257
    • Callegari, C.1    Giordano, S.2    Pagano, M.3
  • 16
    • 80955142776 scopus 로고    scopus 로고
    • Combining sketches and wavelet analysis for multi time-scale network anomaly detection
    • Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Combining sketches and wavelet analysis for multi time-scale network anomaly detection. Computers & Security 30(8), 692-704 (2011
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 692-704
    • Callegari, C.1    Giordano, S.2    Pagano, M.3    Pepe, T.4
  • 17
    • 80052448261 scopus 로고    scopus 로고
    • Detecting heavy change in the heavy hitter distribution of network traffic
    • IEEE Press
    • Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Detecting heavy change in the heavy hitter distribution of network traffic. In: IWCMC, pp. 1298-1303. IEEE Press (2011
    • (2011) IWCMC , pp. 1298-1303
    • Callegari, C.1    Giordano, S.2    Pagano, M.3    Pepe, T.4
  • 18
    • 84861919350 scopus 로고    scopus 로고
    • Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods
    • Callegari, C., Giordano, S., Pagano, M., Pepe, T.: Detecting anomalies in backbone network traffic: A performance comparison among several change detection methods. IJSNet 11(4), 205-214 (2012
    • (2012) IJSNet , vol.11 , Issue.4 , pp. 205-214
    • Callegari, C.1    Giordano, S.2    Pagano, M.3    Pepe, T.4
  • 19
    • 33751110003 scopus 로고    scopus 로고
    • Wavelet based denial-of-service detection
    • Carl, G., Brooks, R.R., Rai, S.: Wavelet based denial-of-service detection. Computers & Security 25(8), 600-615 (2006
    • (2006) Computers & Security , vol.25 , Issue.8 , pp. 600-615
    • Carl, G.1    Brooks, R.R.2    Rai, S.3
  • 22
    • 67949109641 scopus 로고    scopus 로고
    • Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (m3l) pca-based approach
    • Chatzigiannakis, V., Papavassiliou, S., Androulidakis, G.: Improving network anomaly detection effectiveness via an integrated multi-metric-multi- link (m3l) pca-based approach. Security and Communication Networks 2(3), 289-304 (2009
    • (2009) Security and Communication Networks , vol.2 , Issue.3 , pp. 289-304
    • Chatzigiannakis, V.1    Papavassiliou, S.2    Androulidakis, G.3
  • 23
    • 0031515592 scopus 로고    scopus 로고
    • Testing and locating variance change points with application to stock prices
    • Chen, J., Gupta, A.: Testing and locating variance change points with application to stock prices. J. Am. Statist. Assoc. 92, 739-747 (1997
    • (1997) J. Am. Statist. Assoc , vol.92 , pp. 739-747
    • Chen, J.1    Gupta, A.2
  • 27
    • 8344272783 scopus 로고    scopus 로고
    • What's new: Finding significant differences in network data streams
    • Cormode, G., Muthukrishnan, S.: What's new: Finding significant differences in network data streams. In: Proc. of IEEE Infocom, pp. 1534-1545 (2004
    • (2004) Proc. of IEEE Infocom , pp. 1534-1545
    • Cormode, G.1    Muthukrishnan, S.2
  • 28
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary: The count-min sketch and its applications
    • Cormode, G., Muthukrishnan, S.: An improved data stream summary: The count-min sketch and its applications. Journal of Algorithms 55(1), 58-75 (2005
    • (2005) Journal of Algorithms , vol.55 , Issue.1 , pp. 58-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 29
    • 85012186650 scopus 로고    scopus 로고
    • Finding hierarchical heavy hitters in data streams
    • Cormode, G., Muthukrishnan, S., Srivastava, D.: Finding hierarchical heavy hitters in data streams. In: Proc. of VLDB, pp. 464-475 (2003
    • (2003) Proc. of VLDB , pp. 464-475
    • Cormode, G.1    Muthukrishnan, S.2    Srivastava, D.3
  • 31
    • 77956384663 scopus 로고    scopus 로고
    • Distribution-based anomaly detection in 3g mobile networks: From theory to practice
    • D'Alconzo, A., Coluccia, A., Romirer-Maierhofer, P.: Distribution-based anomaly detection in 3g mobile networks: From theory to practice. Int. J. Netw. Manag. 20(5), 245-269 (2010
    • (2010) Int. J. Netw. Manag , vol.20 , Issue.5 , pp. 245-269
    • D'Alconzo, A.1    Coluccia, A.2    Romirer-Maierhofer, P.3
  • 40
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
    • Estan, C., Varghese, G.: New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Transactions on Computer Systems 21, 270-313 (2003
    • (2003) ACM Transactions on Computer Systems , vol.21 , pp. 270-313
    • Estan, C.1    Varghese, G.2
  • 43
    • 77956386014 scopus 로고    scopus 로고
    • On dominant characteristics of residential broadband internet traffic
    • Maier, G., Feldmann, A., Paxson, V., Allman,M.: On dominant characteristics of residential broadband internet traffic. In: IEEE IMC (2009
    • (2009) IEEE IMC
    • Maier, G.1    Feldmann, A.2    Paxson, V.3    Allman, M.4
  • 46
    • 7544223741 scopus 로고    scopus 로고
    • A survey of outlier detection methodologies
    • Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85-126 (2004
    • (2004) Artif. Intell. Rev , vol.22 , Issue.2 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 47
    • 0000106449 scopus 로고
    • Tests for variance shift at an unknown time point
    • Hsu, D.: Tests for variance shift at an unknown time point. Appl. Statist. 26, 279-284 (1977
    • (1977) Appl. Statist , vol.26 , pp. 279-284
    • Hsu, D.1
  • 49
    • 33749848531 scopus 로고
    • Use of cumulative sums of squares for retrospective detection of changes of variance
    • Incl'an, C., Tiao, G.: Use of cumulative sums of squares for retrospective detection of changes of variance. J. Am. Statist. Assoc. 89, 913-923 (1994
    • (1994) J. Am. Statist. Assoc , vol.89 , pp. 913-923
    • Incl'an, C.1    Tiao, G.2
  • 53
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • Lakhina, A.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM, pp. 219-230 (2004
    • (2004) ACM SIGCOMM , pp. 219-230
    • Lakhina, A.1
  • 55
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM (2005
    • (2005) ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 58
    • 0028377540 scopus 로고
    • On the self-similar nature of ethernet traffic (extended version
    • Leland, W.E., Taqqu, M.S., Willinger, W., Wilson, D.V.: On the self-similar nature of ethernet traffic (extended version). IEEE/ACMTrans. Netw. 2(1), 1-15 (1994
    • (1994) IEEE/ ACMTrans. Netw , vol.2 , Issue.1 , pp. 1-15
    • Leland, W.E.1    Taqqu, M.S.2    Willinger, W.3    Wilson, D.V.4
  • 61
    • 0001524507 scopus 로고
    • Procedures for reacting to a change in distribution
    • Lorden, G.: Procedures for reacting to a change in distribution. Ann. Math. Statist. 42, 1897-1908 (1971
    • (1971) Ann. Math. Statist , vol.42 , pp. 1897-1908
    • Lorden, G.1
  • 63
    • 0024700097 scopus 로고
    • A theory for multiresolution signal decomposition: The wavelet representation
    • Mallat, S.G.: A theory for multiresolution signal decomposition: The wavelet representation. IEEE Transactions on Pattern Analysis and Machine Intelligence 11(7), 674-693 (1989
    • (1989) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.11 , Issue.7 , pp. 674-693
    • Mallat, S.G.1
  • 65
    • 79955578061 scopus 로고    scopus 로고
    • M/g/∞transience, and its applications to overload detection
    • Mandjes, M., Zuraniewski, P.:M/g/∞transience, and its applications to overload detection. Performance Evaluation 68, 507-527 (2011
    • (2011) Performance Evaluation , vol.68 , pp. 507-527
    • Mandjes, M.1    Zuraniewski, P.2
  • 66
    • 2442443820 scopus 로고    scopus 로고
    • Approximate frequency counts over data streams
    • Manku, G.S., Motwani, R.: Approximate frequency counts over data streams. In: VLDB, pp. 346-357 (2002
    • (2002) VLDB , pp. 346-357
    • Manku, G.S.1    Motwani, R.2
  • 70
    • 76249095726 scopus 로고    scopus 로고
    • Traffic anomaly detection using k-means clustering
    • Munz, G., Li, S., Carle, G.: Traffic anomaly detection using k-means clustering. In: GI/ITGWorkshop MMBnet (2007
    • (2007) GI/ITGWorkshop MMBnet
    • Munz, G.1    Li, S.2    Carle, G.3
  • 71
    • 1842539182 scopus 로고    scopus 로고
    • Data streams: Algorithms and applications
    • Society for Industrial and Applied Mathematics Philadelphia
    • Muthukrishnan, S.: Data streams: Algorithms and applications. In: Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 413-413. Society for Industrial and Applied Mathematics, Philadelphia (2003
    • (2003) Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 413-413
    • Muthukrishnan, S.1
  • 72
    • 7444268118 scopus 로고    scopus 로고
    • Adaptive clustering for network intrusion detection
    • Dai, H., Srikant, R., Zhang, C. (eds. Springer, Heidelberg
    • Oldmeadow, J., Ravinutala, S., Leckie, C.: Adaptive Clustering for Network Intrusion Detection. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS (LNAI), vol. 3056, pp. 255-259. Springer, Heidelberg (2004
    • (2004) PAKDD 2004. LNCS (LNAI , vol.3056 , pp. 255-259
    • Oldmeadow, J.1    Ravinutala, S.2    Leckie, C.3
  • 73
    • 0002916530 scopus 로고
    • Continuous inspection scheme
    • Page, E.: Continuous inspection scheme. Biometrika 41, 100-115 (1954
    • (1954) Biometrika , vol.41 , pp. 100-115
    • Page, E.1
  • 74
    • 0000783098 scopus 로고
    • Optimal detection of a change in distribution
    • Pollak, M.: Optimal detection of a change in distribution. Ann. Statist. 13, 206-227 (1985
    • (1985) Ann. Statist , vol.13 , pp. 206-227
    • Pollak, M.1
  • 77
    • 0039845384 scopus 로고    scopus 로고
    • Efficient algorithms for mining outliers from large data sets
    • Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. SIGMOD Rec. 29(2), 427-438 (2000
    • (2000) SIGMOD Rec , vol.29 , Issue.2 , pp. 427-438
    • Ramaswamy, S.1    Rastogi, R.2    Shim, K.3
  • 80
    • 74849109011 scopus 로고    scopus 로고
    • A review of dos attack models for 3g cellular networks from a system-design perspective
    • Ricciato, F., Coluccia, A., D'Alconzo, A.: A review of dos attack models for 3g cellular networks from a system-design perspective. Computer Communications 33(5), 551-558 (2010
    • (2010) Computer Communications , vol.33 , Issue.5 , pp. 551-558
    • Ricciato, F.1    Coluccia, A.2    D'Alconzo, A.3
  • 82
    • 0034239268 scopus 로고    scopus 로고
    • Real-Time estimation of the parameters of long-range dependence
    • Roughan, M., Veitch, D., Abry, P.: Real-Time estimation of the parameters of long-range dependence. IEEE/ACM Trans. Netw. 8(4), 467-478 (2000
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.4 , pp. 467-478
    • Roughan, M.1    Veitch, D.2    Abry, P.3
  • 84
    • 0002196122 scopus 로고
    • On optimum methods in quickest detection problems
    • Shiryaev, A.: On optimum methods in quickest detection problems. Theory Probab. Appl. 8, 22-46 (1963
    • (1963) Theory Probab. Appl , vol.8 , pp. 22-46
    • Shiryaev, A.1
  • 85
    • 11644287656 scopus 로고
    • On Markov sufficient statistics in non-Additive Bayes problems of sequential analysis
    • Shiryaev, A.: On Markov sufficient statistics in non-Additive Bayes problems of sequential analysis. Theory Probab. Appl. 9, 604-618 (1964
    • (1964) Theory Probab. Appl , vol.9 , pp. 604-618
    • Shiryaev, A.1
  • 92
    • 33747009728 scopus 로고    scopus 로고
    • Changepoint detection in multi-channel and distributed systems with applications
    • Tartakovsky, A., Veeravalli, V.: Changepoint detection in multi-channel and distributed systems with applications. In: Applications of Sequential Methodologies, pp. 331-363 (2004
    • (2004) Applications of Sequential Methodologies , pp. 331-363
    • Tartakovsky, A.1    Veeravalli, V.2
  • 93
    • 1842435123 scopus 로고    scopus 로고
    • Tabulation based 4-universal hashing with applications to second moment estimation
    • Society for Industrial and AppliedMathematics Philadelphia
    • Thorup, M., Zhang, Y.: Tabulation based 4-universal hashing with applications to second moment estimation. In: SODA 2004: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 615-624. Society for Industrial and AppliedMathematics, Philadelphia (2004
    • (2004) SODA 2004: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 615-624
    • Thorup, M.1    Zhang, Y.2
  • 95
  • 97
    • 84871061297 scopus 로고    scopus 로고
    • On attack causality in internet-connected cellular networks
    • August
    • Traynor, P., McDaniel, P., La Porta, T.: On attack causality in internet-connected cellular networks. In: USENIX Security (August 2007
    • (2007) USENIX Security
    • Traynor, P.1    McDaniel, P.2    La Porta, T.3
  • 100
    • 0039466554 scopus 로고    scopus 로고
    • Boundary crossing probability for Brownian motion and general boundaries
    • Wang, L., Potzelberger, K.: Boundary crossing probability for Brownian motion and general boundaries. J. Appl. Probab. 34, 54-65 (1997
    • (1997) J. Appl. Probab , vol.34 , pp. 54-65
    • Wang, L.1    Potzelberger, K.2
  • 101
    • 33750949942 scopus 로고    scopus 로고
    • Identifying intrusions in computer networks with principal component analysis
    • Reliability and Security IEEE Computer Society, Washington, DC
    • Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 270-279. IEEE Computer Society, Washington, DC (2006
    • (2006) ARES 2006: Proceedings of the First International Conference on Availability , pp. 270-279
    • Wang, W.1    Battiti, R.2
  • 102
    • 21144450811 scopus 로고    scopus 로고
    • A novel intrusion detection method based on principle component analysis in computer security
    • Yin, F.-L., Wang, J., Guo, C. (eds. Springer, Heidelberg
    • Wang, W., Guan, X., Zhang, X.: A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. In: Yin, F.-L., Wang, J., Guo, C. (eds.) ISNN 2004, Part II. LNCS, vol. 3174, pp. 657-662. Springer, Heidelberg (2004
    • (2004) ISNN 2004, Part II. LNCS , vol.3174 , pp. 657-662
    • Wang, W.1    Guan, X.2    Zhang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.