메뉴 건너뛰기




Volumn 258, Issue , 2014, Pages 403-415

Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications

Author keywords

Anomaly detection; Catastrophe theory; Chaotic dynamics; Cloud communication; Network traffic; Synergetic neural networks

Indexed keywords

ANOMALY DETECTION; CATASTROPHE THEORY; CHAOTIC DYNAMICS; CLOUD COMMUNICATIONS; NETWORK TRAFFIC; SYNERGETIC NEURAL NETWORKS;

EID: 84889094568     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2013.04.009     Document Type: Article
Times cited : (79)

References (37)
  • 6
    • 84939061075 scopus 로고
    • Traffic modeling for telecommunications networks
    • V. Frost, and B. Melamed Traffic modeling for telecommunications networks IEEE Communications Magazine 32 1994 70 81
    • (1994) IEEE Communications Magazine , vol.32 , pp. 70-81
    • Frost, V.1    Melamed, B.2
  • 8
    • 49849084469 scopus 로고    scopus 로고
    • A feasible intrusion detector for recognizing IIS attacks based on neural networks
    • S. Horng, P. Fan, Y. Chou, Y. Chang, and Y. Pan A feasible intrusion detector for recognizing IIS attacks based on neural networks Computers & Security 27 2008 84 100
    • (2008) Computers & Security , vol.27 , pp. 84-100
    • Horng, S.1    Fan, P.2    Chou, Y.3    Chang, Y.4    Pan, Y.5
  • 9
    • 61749104382 scopus 로고    scopus 로고
    • Profiling and identification of P2P traffic
    • Y. Hu, D.M. Chiu, and J. Lui Profiling and identification of P2P traffic Computer Networks 53 2009 849 863
    • (2009) Computer Networks , vol.53 , pp. 849-863
    • Hu, Y.1    Chiu, D.M.2    Lui, J.3
  • 10
    • 79955775579 scopus 로고    scopus 로고
    • Profiling-by-association: A resilient traffic profiling solution for the internet backbone
    • Philadelphia, USA
    • M. Iliofotou, B. Gallagher, T. Eliassi-Rad, G. Xie, M. Faloutsos, Profiling-by-association: a resilient traffic profiling solution for the internet backbone, in: ACM CoNEXT 2010, Philadelphia, USA, 2010, pp. 1-5.
    • (2010) ACM CoNEXT 2010 , pp. 1-5
    • Iliofotou, M.1    Gallagher, B.2    Eliassi-Rad, T.3    Xie, G.4    Faloutsos, M.5
  • 11
    • 78649491247 scopus 로고    scopus 로고
    • Network prefix-level traffic profiling: Characterizing, modeling, and evaluation
    • H. Jiang, Z. Ge, S. Jin, J. Wang, Network prefix-level traffic profiling: Characterizing, modeling, and evaluation, Computer Networks 54 3327-3340.
    • Computer Networks , vol.54 , pp. 3327-3340
    • Jiang, H.1    Ge, Z.2    Jin, S.3    Wang, J.4
  • 12
    • 33847303101 scopus 로고    scopus 로고
    • BLINC: Multilevel traffic classification in the dark
    • Philadelphia, Pennsylvania, USA
    • T. Karagiannis, K. Papagiannaki, M. Faloutsos, BLINC: multilevel traffic classification in the dark, in: SIGCOMM'05, Philadelphia, Pennsylvania, USA, 2005, pp. 229-240.
    • (2005) SIGCOMM'05 , pp. 229-240
    • Karagiannis, T.1    Papagiannaki, K.2    Faloutsos, M.3
  • 13
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • S. Kim, and A. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Transactions on Networking 16 2008 562 575
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , pp. 562-575
    • Kim, S.1    Reddy, A.2
  • 14
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, C. Diot, Mining anomalies using traffic feature distributions, in: SIGCOMM '05, 2005, pp. 217-228.
    • (2005) SIGCOMM '05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 19
    • 67650149213 scopus 로고    scopus 로고
    • Spatio-temporal network anomaly detection by assessing deviations of empirical measures
    • I. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE/ACM Transactions on Networking 17 2009 685 697
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , pp. 685-697
    • Paschalidis, I.1    Smaragdakis, G.2
  • 20
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson Bro: a system for detecting network intruders in real-time Computer Networks 31 1999 2435 2463
    • (1999) Computer Networks , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 21
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly intrusion detection method based on HMM
    • Y. Qiao, X. Xin, Y. Bin, and S. Ge Anomaly intrusion detection method based on HMM Electronics Letters 38 2002 663 664
    • (2002) Electronics Letters , vol.38 , pp. 663-664
    • Qiao, Y.1    Xin, X.2    Bin, Y.3    Ge, S.4
  • 25
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • S. Shanbhag, and T. Wolf Accurate anomaly detection through parallelism IEEE Network 23 2009 22 28
    • (2009) IEEE Network , vol.23 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 26
    • 84866102744 scopus 로고    scopus 로고
    • Advanced probabilistic approach for network intrusion forecasting and detection
    • S. Shin, S. Lee, H. Kim, and S. Kim Advanced probabilistic approach for network intrusion forecasting and detection Expert Systems with Applications 40 2013 315 322
    • (2013) Expert Systems with Applications , vol.40 , pp. 315-322
    • Shin, S.1    Lee, S.2    Kim, H.3    Kim, S.4
  • 27
    • 34250801472 scopus 로고    scopus 로고
    • A hybrid machine learning approach to network anomaly detection
    • T. Shon, and J. Moon A hybrid machine learning approach to network anomaly detection Information Sciences 177 2007 3799 3821
    • (2007) Information Sciences , vol.177 , pp. 3799-3821
    • Shon, T.1    Moon, J.2
  • 30
    • 75749155657 scopus 로고
    • Structural stability, catastrophe theory, and applied mathematics
    • R. Thom Structural stability, catastrophe theory, and applied mathematics SIAM Review 19 1977 189 201
    • (1977) SIAM Review , vol.19 , pp. 189-201
    • Thom, R.1
  • 31
    • 25144437034 scopus 로고    scopus 로고
    • An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J]
    • X. WANG, and B. FANG An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J] Journal of Harbin Institute of Technology 37 2005 1046 1049
    • (2005) Journal of Harbin Institute of Technology , vol.37 , pp. 1046-1049
    • Wang, X.1    Fang, B.2
  • 32
    • 77957956906 scopus 로고    scopus 로고
    • Anomaly detection of network traffic based on autocorrelation principle
    • X. Wei, H. Han-ping, and Y. Yue Anomaly detection of network traffic based on autocorrelation principle Journal of Communication and Computer 4 2007 15 19
    • (2007) Journal of Communication and Computer , vol.4 , pp. 15-19
    • Wei, X.1    Han-Ping, H.2    Yue, Y.3
  • 33
    • 62549110832 scopus 로고    scopus 로고
    • Estimating parameters of chaotic systems under noise-induced synchronization
    • X. Wu, and Z. Wang Estimating parameters of chaotic systems under noise-induced synchronization Chaos, Solitons & Fractals 39 2009 689 696
    • (2009) Chaos, Solitons & Fractals , vol.39 , pp. 689-696
    • Wu, X.1    Wang, Z.2
  • 34
    • 61449197774 scopus 로고    scopus 로고
    • A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors
    • Y. Xie, and S. Yu A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors IEEE/ACM Transactions on Networking 17 2009 54 65
    • (2009) IEEE/ACM Transactions on Networking , vol.17 , pp. 54-65
    • Xie, Y.1    Yu, S.2
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.