메뉴 건너뛰기




Volumn 41, Issue 1, 2014, Pages 182-196

Randomized Anagram revisited

Author keywords

Adversarial classification; Anomaly detection; Evasion attacks; Intrusion detection systems; Keywords

Indexed keywords

COMPUTER CRIME; LEARNING ALGORITHMS;

EID: 84899065894     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.11.006     Document Type: Article
Times cited : (8)

References (42)
  • 1
    • 79955482186 scopus 로고    scopus 로고
    • HMMPayl an intrusion detection system based on hidden Markov models
    • D. Ariu, R. Tronci, and G. Giacinto HMMPayl an intrusion detection system based on hidden Markov models Comput Secur 30 2011 221 241
    • (2011) Comput Secur , vol.30 , pp. 221-241
    • Ariu, D.1    Tronci, R.2    Giacinto, G.3
  • 5
    • 79952315022 scopus 로고    scopus 로고
    • Multiple classifier systems for robust classifier design in adversarial environments
    • B. Biggio, G. Fumera, and F. Roli Multiple classifier systems for robust classifier design in adversarial environments Int J Mach Learn Cybern 1 2010 27 41
    • (2010) Int J Mach Learn Cybern , vol.1 , pp. 27-41
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 6
    • 84886467730 scopus 로고    scopus 로고
    • Security evaluation of pattern classifiers under attack
    • B. Biggio, G. Fumera, and F. Roli Security evaluation of pattern classifiers under attack IEEE Trans Knowl Data Eng 99 2013 1
    • (2013) IEEE Trans Knowl Data Eng , vol.99 , pp. 1
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 7
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • B.H. Bloom Space/time trade-offs in hash coding with allowable errors Commun ACM 13 1970 422 426
    • (1970) Commun ACM , vol.13 , pp. 422-426
    • Bloom, B.H.1
  • 8
    • 18844454571 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • DOI 10.1016/j.comnet.2005.01.010, PII S1389128605000125, Web Traffic
    • D. Brumley, and D. Boneh Remote timing attacks are practical Comput Netw 48 2005 701 716 (Pubitemid 40684158)
    • (2005) Computer Networks , vol.48 , Issue.5 , pp. 701-716
    • Brumley, D.1    Boneh, D.2
  • 12
    • 84876939080 scopus 로고    scopus 로고
    • Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues
    • I. Corona, G. Giacinto, and F. Roli Adversarial attacks against intrusion detection systems taxonomy, solutions and open issues Inf Sci 239 2013 201 225
    • (2013) Inf Sci , vol.239 , pp. 201-225
    • Corona, I.1    Giacinto, G.2    Roli, F.3
  • 13
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Fogla P, Lee W. Evading network anomaly detection systems: formal reasoning and practical techniques. In: Proceedings of the 13th ACM conference on computer and communications security. ACM, Alexandria, VA, USA; 2006. p. 59-68. (Pubitemid 47131356)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 59-68
    • Fogla, P.1    Lee, W.2
  • 16
    • 84868252396 scopus 로고    scopus 로고
    • Machine learning based network traffic classification a survey
    • B. Hu, and Y. Shen Machine learning based network traffic classification a survey J Inf Comput Sci 9 2012 3161 3170
    • (2012) J Inf Comput Sci , vol.9 , pp. 3161-3170
    • Hu, B.1    Shen, Y.2
  • 18
    • 84862299994 scopus 로고    scopus 로고
    • Online anomaly detection under adversarial impact
    • M. Kloft, and P. Laskov Online anomaly detection under adversarial impact J Mach Learn Res - Proc Track 9 2010 405 412
    • (2010) J Mach Learn Res - Proc Track , vol.9 , pp. 405-412
    • Kloft, M.1    Laskov, P.2
  • 19
    • 31844441673 scopus 로고    scopus 로고
    • Advanced polymorphic worms: Evading IDS by blending in with normal traffic
    • Georgia Institute of Technology
    • Kolesnikov O, Lee W. Advanced polymorphic worms: evading IDS by blending in with normal traffic. Technical Report, Georgia Institute of Technology; 2005.
    • (2005) Technical Report
    • Kolesnikov, O.1    Lee, W.2
  • 20
    • 78650169163 scopus 로고    scopus 로고
    • The use of artificial intelligence based techniques for intrusion detection a review
    • G. Kumar, K. Kumar, and M. Sachdeva The use of artificial intelligence based techniques for intrusion detection a review Artif Intell Rev 34 2010 369 387
    • (2010) Artif Intell Rev , vol.34 , pp. 369-387
    • Kumar, G.1    Kumar, K.2    Sachdeva, M.3
  • 21
    • 80052025073 scopus 로고    scopus 로고
    • Self-adaptive and dynamic clustering for online anomaly detection
    • S. Lee, G. Kim, and S. Kim Self-adaptive and dynamic clustering for online anomaly detection Expert Syst Appl 38 2011 14891 14898
    • (2011) Expert Syst Appl , vol.38 , pp. 14891-14898
    • Lee, S.1    Kim, G.2    Kim, S.3
  • 27
    • 84867868962 scopus 로고    scopus 로고
    • Evaluation of classification algorithms for intrusion detection in MANETs
    • S. Pastrana, A. Mitrokotsa, A. Orfila, and P. Peris-Lopez Evaluation of classification algorithms for intrusion detection in MANETs Knowl-Based Syst 36 2012 217 225
    • (2012) Knowl-Based Syst , vol.36 , pp. 217-225
    • Pastrana, S.1    Mitrokotsa, A.2    Orfila, A.3    Peris-Lopez, P.4
  • 28
    • 33751051489 scopus 로고    scopus 로고
    • Misleading worm signature generators using deliberate noise injection
    • DOI 10.1109/SP.2006.26, 1623998, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
    • Perdisci R, Dagon D, Lee W, Fogla P, Sharif M. Misleading worm signature generators using deliberate noise injection. In: Proceedings of the 2006 IEEE symposium on security and privacy. IEEE; 2006, p. 17-31. (Pubitemid 44753709)
    • (2006) Proceedings - IEEE Symposium on Security and Privacy , vol.2006 , pp. 17-31
    • Perdisci, R.1    Dagon, D.2    Lee, W.3    Foglat, P.4    Sharif, M.5
  • 29
    • 61749083929 scopus 로고    scopus 로고
    • McPAD a multiple classifier system for accurate payload-based anomaly detection
    • R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee McPAD a multiple classifier system for accurate payload-based anomaly detection Comput Netw 53 2009 864 881
    • (2009) Comput Netw , vol.53 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 30
    • 0004145058 scopus 로고    scopus 로고
    • Insertion, evasion, and denial of service: Eluding network intrusion detection
    • Secure Networks, Inc., Syracuse, NY, USA
    • Ptacek TH, Newsham TN. Insertion, evasion, and denial of service: eluding network intrusion detection. Technical Report, Secure Networks, Inc., Syracuse, NY, USA; 1998.
    • (1998) Technical Report
    • Ptacek, T.H.1    Newsham, T.N.2
  • 31
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • USENIX, Seattle, WA, USA
    • Roesch M. Snort: lightweight intrusion detection for networks. In: Proceedings of the 13th systems administration conference, USENIX, Seattle, WA, USA; 1999. p. 229-38.
    • (1999) Proceedings of the 13th Systems Administration Conference , pp. 229-238
    • Roesch, M.1
  • 32
    • 84872248901 scopus 로고    scopus 로고
    • A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques
    • K. Satpute, S. Agrawal, J. Agrawal, and S. Sharma A survey on anomaly detection in network intrusion detection system using particle swarm optimization based machine learning techniques Adv Intell Syst Comput 199 2013 441 452
    • (2013) Adv Intell Syst Comput , vol.199 , pp. 441-452
    • Satpute, K.1    Agrawal, S.2    Agrawal, J.3    Sharma, S.4
  • 33
    • 42449117164 scopus 로고    scopus 로고
    • SP 800-94. Guide to intrusion detection and prevention systems (IDPS)
    • Gaithersburg, MD, United States
    • Scarfone KA, Mell PM. SP 800-94. Guide to intrusion detection and prevention systems (IDPS), Technical Report, Gaithersburg, MD, United States; 2007.
    • (2007) Technical Report
    • Scarfone, K.A.1    Mell, P.M.2
  • 35
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • IEEE Computer Society, Washington, DC, USA
    • Sommer R, Paxson V. Outside the closed world: on using machine learning for network intrusion detection. In: Proceedings of the 2010 IEEE symposium on security and privacy, SP '10, IEEE Computer Society, Washington, DC, USA; 2010. p. 305-16.
    • (2010) Proceedings of the 2010 IEEE Symposium on Security and Privacy, SP '10 , pp. 305-316
    • Sommer, R.1    Paxson, V.2
  • 37
    • 84874114774 scopus 로고    scopus 로고
    • Toward a more practical unsupervised anomaly detection system
    • J. Song, H. Takakura, Y. Okabe, and K. Nakao Toward a more practical unsupervised anomaly detection system Inf Sci Int J 231 2013 4 14
    • (2013) Inf Sci Int J , vol.231 , pp. 4-14
    • Song, J.1    Takakura, H.2    Okabe, Y.3    Nakao, K.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.