메뉴 건너뛰기




Volumn 24, Issue 4, 2014, Pages 318-336

Similarity as a central approach to flow-based anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER APPLICATIONS; COMPUTER NETWORKS;

EID: 84904187835     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.1867     Document Type: Article
Times cited : (20)

References (94)
  • 1
    • 84879651756 scopus 로고    scopus 로고
    • Anomaly detection and mitigation at Internet scale: A survey
    • In, Doyen G. Waldburger M. Čeleda P. Sperotto A. Stiller B. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
    • Steinberger J, Schehlmann L, Abt S, Baier H,. Anomaly detection and mitigation at Internet scale: a survey. In Emerging Management Mechanisms for the Future Internet, Doyen G, Waldburger M, Čeleda P, Sperotto A, Stiller B, (eds.), Lecture Notes in Computer Science, vol. 7943. Springer: Berlin, 2013; 49-60.
    • (2013) Emerging Management Mechanisms for the Future Internet , vol.7943 , pp. 49-60
    • Steinberger, J.1    Schehlmann, L.2    Abt, S.3    Baier, H.4
  • 12
    • 84885780072 scopus 로고    scopus 로고
    • Design and evaluation of HTTP protocol parsers for IPFIX measurement
    • In, Lecture Notes in Computer Science, . Springer: Berlin.
    • Velan P, Jirsík T, Čeleda P,. Design and evaluation of HTTP protocol parsers for IPFIX measurement. In Advances in Communication Networking, Lecture Notes in Computer Science, vol. 8115. Springer: Berlin, 2013; 136-147.
    • (2013) Advances in Communication Networking , vol.8115 , pp. 136-147
    • Velan, P.1    Jirsík, T.2    Čeleda, P.3
  • 14
    • 84867375385 scopus 로고    scopus 로고
    • BYOD: Security and privacy considerations
    • Miller KW, Voas J, Hurlburt GF,. BYOD: Security and privacy considerations, IT Professional 2012; 14 (5): 53-55.
    • (2012) IT Professional , vol.14 , Issue.5 , pp. 53-55
    • Miller, K.W.1    Voas, J.2    Hurlburt, G.F.3
  • 15
    • 77956877124 scopus 로고    scopus 로고
    • The Internet of Things: A survey
    • Atzori L, Iera A, Morabito G,. The Internet of Things: a survey, Computer Networks 2010; 54 (15): 2787-2805.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 16
    • 79953770333 scopus 로고    scopus 로고
    • An introduction to IP flow information export (IPFIX)
    • Trammell B, Boschi E,. An introduction to IP flow information export (IPFIX), IEEE Communications Magazine 2011; 49 (4): 89-95.
    • (2011) IEEE Communications Magazine , vol.49 , Issue.4 , pp. 89-95
    • Trammell, B.1    Boschi, E.2
  • 18
    • 68949173234 scopus 로고    scopus 로고
    • Taxonomies of attacks and vulnerabilities in computer systems
    • Igure V, Williams R,. Taxonomies of attacks and vulnerabilities in computer systems, IEEE Communications Surveys Tutorials 2008; 10 (1): 6-19.
    • (2008) IEEE Communications Surveys Tutorials , vol.10 , Issue.1 , pp. 6-19
    • Igure, V.1    Williams, R.2
  • 19
    • 15744370034 scopus 로고    scopus 로고
    • A taxonomy of network and computer attacks
    • DOI 10.1016/j.cose.2004.06.011, PII S0167404804001804
    • Hansman S, Hunt R,. A taxonomy of network and computer attacks, Computers and Security 2005; 24 (1): 31-43. (Pubitemid 40415398)
    • (2005) Computers and Security , vol.24 , Issue.1 , pp. 31-43
    • Hansman, S.1    Hunt, R.2
  • 21
  • 25
    • 33846190721 scopus 로고    scopus 로고
    • Host behaviour based early detection of worm outbreaks in internet backbones
    • DOI 10.1109/WETICE.2005.40, 1566204, Proceedings - Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2005
    • Dübendorfer T, Plattner B,. Host behaviour based early detection of worm outbreaks in Internet backbones, In Proceedings of the 14th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprise, Linköping, Sweden, 2005; 166-171. (Pubitemid 46090869)
    • (2005) Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE , vol.2005 , pp. 166-171
    • Dubendorfer, T.1    Plattner, B.2
  • 28
    • 82955180276 scopus 로고    scopus 로고
    • Network attack detection at flow level
    • In, Balandin S. Koucheryavy Y. Hu H. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
    • Galtsev AA, Sukhov AM,. Network attack detection at flow level. In Smart Spaces and Next Generation Wired/Wireless Networking, Balandin S, Koucheryavy Y, Hu H, (eds.), Lecture Notes in Computer Science, vol. 6869. Springer: Berlin, 2011; 326-334.
    • (2011) Smart Spaces and Next Generation Wired/Wireless Networking , vol.6869 , pp. 326-334
    • Galtsev, A.A.1    Sukhov, A.M.2
  • 29
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
    • Lakhina A, Crovella M, Diot C,. Diagnosing network-wide traffic anomalies, SIGCOMM Computer Communication Review 2004; 34 (4): 219-230. (Pubitemid 40954882)
    • (2004) Computer Communication Review , vol.34 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 32
    • 84885796339 scopus 로고    scopus 로고
    • Protocol-independent detection of dictionary attacks
    • In, Bauschert T. (ed.), Lecture Notes in Computer Science, . Springer: Berlin.
    • Drašar M,. Protocol-independent detection of dictionary attacks. In Advances in Communication Networking, Bauschert T, (ed.), Lecture Notes in Computer Science, vol. 8115. Springer: Berlin, 2013; 304-309.
    • (2013) Advances in Communication Networking , vol.8115 , pp. 304-309
    • Drašar, M.1
  • 34
    • 79956034020 scopus 로고    scopus 로고
    • BotTrack: Tracking botnets using NetFlow and PageRank
    • In, Domingo-Pascual J. Manzoni P. Palazzo S. Pont A. Scoglio C. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
    • François J, Wang S, State R, Engel T,. BotTrack: tracking botnets using NetFlow and PageRank. In IFIP NETWORKING 2011, Domingo-Pascual J, Manzoni P, Palazzo S, Pont A, Scoglio C, (eds.), Lecture Notes in Computer Science, vol. 6640. Springer: Berlin, 2011; 1-14.
    • (2011) IFIP Networking 2011 , vol.6640 , pp. 1-14
    • François, J.1    Wang, S.2    State, R.3    Engel, T.4
  • 38
    • 77956377864 scopus 로고    scopus 로고
    • A scalable, efficient and informative approach for anomaly- based intrusion detection systems: Theory and practice
    • Salem O, Vaton S, Gravey A,. A scalable, efficient and informative approach for anomaly- based intrusion detection systems: theory and practice, International Journal of Network Management 2010; 20 (5): 271-293.
    • (2010) International Journal of Network Management , vol.20 , Issue.5 , pp. 271-293
    • Salem, O.1    Vaton, S.2    Gravey, A.3
  • 39
    • 84863186562 scopus 로고    scopus 로고
    • Hierarchical method for anomaly detection and attack identification in high-speed network
    • Yan R, Shao C,. Hierarchical method for anomaly detection and attack identification in high-speed network, Information Technology Journal 2012; 11 (9): 1243-1250.
    • (2012) Information Technology Journal , vol.11 , Issue.9 , pp. 1243-1250
    • Yan, R.1    Shao, C.2
  • 40
    • 84904205325 scopus 로고    scopus 로고
    • Detecting anomalies in interhosts communication graph
    • Scottsdale, AZ, [31 October 2013]
    • Ishibashi K, Kondoh T, Harada S, Mori T, Kawahara R, Asano S,. Detecting anomalies in interhosts communication graph, In CERT FloCon Workshop: Scottsdale, AZ, 2009. Available: http://www.cert.org/flocon/2009/presentations/ Ishibashi-GraphAnomalies.pdf [31 October 2013].
    • (2009) CERT FloCon Workshop
    • Ishibashi, K.1    Kondoh, T.2    Harada, S.3    Mori, T.4    Kawahara, R.5    Asano, S.6
  • 44
    • 84904199992 scopus 로고    scopus 로고
    • Revisiting the threshold random walk scan detector
    • Savannah, GA, [31 October 2013]
    • Nagaonkar V, McHugh J,. Revisiting the threshold random walk scan detector, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/2008/presentations/flocon08-mchugh-vagi.pdf [31 October 2013].
    • (2008) CERT FloCon Workshop
    • Nagaonkar, V.1    McHugh, J.2
  • 45
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • DOI 10.1145/1090191.1080112
    • Xu K, Zhang ZL, Bhattacharyya S,. Profiling Internet backbone traffic: behavior models and applications, In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications: SIGCOMM'05. ACM: New York, 2005; 169-180. (Pubitemid 46323502)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 46
    • 69249205008 scopus 로고    scopus 로고
    • The Cyber Systems and Technology Group [31 October 2013]
    • The Cyber Systems and Technology Group. DARPA intrusion detection data sets. Available: http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ ideval/data/ [31 October 2013].
    • DARPA Intrusion Detection Data Sets
  • 47
    • 84870674934 scopus 로고    scopus 로고
    • The MAWI Working Group [31 October 2013]
    • The MAWI Working Group. MAWI Working Group traffic archive. Available: http://mawi.wide.ad.jp/mawi/ [31 October 2013].
    • MAWI Working Group Traffic Archive
  • 48
    • 0141723181 scopus 로고    scopus 로고
    • [31 October 2013]
    • KDD Cup 1999 data. Available: http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html [31 October 2013].
    • KDD Cup 1999 Data
  • 50
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
    • McHugh J,. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security; 3 (4): 262-294.
    • ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 54
    • 84868286263 scopus 로고    scopus 로고
    • Packet and flow based network intrusion dataset
    • In, Parashar M. Kaushik D. Zomaya A. (eds.), . Springer: Berlin.
    • Gogoi P, Bhuyan MH, Bhattacharyya DK, Kalita JK,. Packet and flow based network intrusion dataset. In Contemporary Computing, Parashar M, Kaushik D, Zomaya A, (eds.), Vol. 306. Springer: Berlin, 2012; 322-334.
    • (2012) Contemporary Computing , vol.306 , pp. 322-334
    • Gogoi, P.1    Bhuyan, M.H.2    Bhattacharyya, D.K.3    Kalita, J.K.4
  • 60
    • 84904207156 scopus 로고    scopus 로고
    • Framework for comparison of network anomaly detection algorithms
    • [31 October 2013]
    • Bartoš V, Žádík M,. Framework for comparison of network anomaly detection algorithms. Technical Report, Faculty of Information Technology BUT, 2012. Available: http://www.fit.vutbr.cz/research/ view-pub.php?id=10070 [31 October 2013].
    • (2012) Technical Report, Faculty of Information Technology but
    • Bartoš, V.1    Žádík, M.2
  • 61
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S,. The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security 2000; 3 (3): 186-205.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 62
    • 80051569378 scopus 로고    scopus 로고
    • A flow-level taxonomy and prevalence of brute force attacks
    • In, Abraham A. Mauri J.L. Buford J.F. Suzuki J. Thampi S.M. (eds.), Communications in Computer and Information Science, . Springer: Berlin.
    • Vykopal J,. A flow-level taxonomy and prevalence of brute force attacks. In Advances in Computing and Communications, Abraham A, Mauri JL, Buford JF, Suzuki J, Thampi SM, (eds.), Communications in Computer and Information Science, vol. 191. Springer: Berlin, 2011; 666-675.
    • (2011) Advances in Computing and Communications , vol.191 , pp. 666-675
    • Vykopal, J.1
  • 63
    • 84904203940 scopus 로고    scopus 로고
    • CAMNEP: Multistage collective network behavior analysis system with hardware accelerated NetFlow probes, in
    • Scottsdale AZ, Available: [31 October 2013]
    • Rehák M, Čeleda P, Pěchouček M, Novotný J,. CAMNEP: multistage collective network behavior analysis system with hardware accelerated NetFlow probes, In CERT FloCon Workshop: Scottsdale, AZ, 2009. Available: http://www.cert.org/flocon/2009/presentations/ Rehak-Camnep.pdf [31 October 2013].
    • (2009) CERT FloCon Workshop
    • Rehák, M.1    Čeleda, P.2    Pěchouček, M.3    Novotný, J.4
  • 66
    • 84904198553 scopus 로고    scopus 로고
    • Considerations for scan detection using flow data
    • Albuquerque NM, [31 October 2013]
    • McHugh J,. Considerations for scan detection using flow data, In CERT FloCon Workshop: Albuquerque, NM, 2013. Available: http://www.cert.org/flocon/ 2013/presentations/mchugh-john-scan-detection.pdf [31 October 2013].
    • (2013) CERT FloCon Workshop
    • McHugh, J.1
  • 69
    • 84874719821 scopus 로고    scopus 로고
    • Study on the TOPN abnormal detection based on the NetFlow data set
    • Zhang H,. Study on the TOPN abnormal detection based on the NetFlow data set, Computer and Information Science 2009; 2 (3): 103-108.
    • (2009) Computer and Information Science , vol.2 , Issue.3 , pp. 103-108
    • Zhang, H.1
  • 72
    • 84861990847 scopus 로고    scopus 로고
    • SSHCure: A flow-based SSH intrusion detection system
    • In, Sadre R. Novotný J. Čeleda P. Waldburger M. Stiller B. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
    • Hellemons L, Hendriks L, Hofstede R, Sperotto A, Sadre R, Pras A,. SSHCure: a flow-based SSH intrusion detection system. In Dependable Networks and Services, Sadre R, Novotný J, Čeleda P, Waldburger M, Stiller B, (eds.), Lecture Notes in Computer Science, vol. 7279. Springer: Berlin, 2012; 86-97.
    • (2012) Dependable Networks and Services , vol.7279 , pp. 86-97
    • Hellemons, L.1    Hendriks, L.2    Hofstede, R.3    Sperotto, A.4    Sadre, R.5    Pras, A.6
  • 73
    • 84904180737 scopus 로고    scopus 로고
    • Analysis of the US-CERT DAC
    • Pittsburgh, PA, [31 October 2013]
    • McNutt J,. Analysis of the US-CERT DAC, In CERT FloCon Workshop, Pittsburgh, PA, 2004. Available: http://www.cert.org/flocon/2004/proceedings/ flocon2004-analysis-mcnutt.pdf [31 October 2013].
    • (2004) CERT FloCon Workshop
    • McNutt, J.1
  • 74
    • 84904181678 scopus 로고    scopus 로고
    • Identifying anomalous traffic using Delta Traffic
    • Savannah, GA, [31 October 2013]
    • Kondoh T, Ishibashi K,. Identifying anomalous traffic using Delta Traffic, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/2008/presentations/kondoh-flocon2008.pdf [31 October 2013].
    • (2008) CERT FloCon Workshop
    • Kondoh, T.1    Ishibashi, K.2
  • 75
    • 84878912661 scopus 로고    scopus 로고
    • Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks
    • Hashim F, Munasinghe KS, Jamalipour A,. Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks, IEEE Transactions on Network and Service Management; 7 (4): 268-281.
    • IEEE Transactions on Network and Service Management , vol.7 , Issue.4 , pp. 268-281
    • Hashim, F.1    Munasinghe, K.S.2    Jamalipour, A.3
  • 76
    • 84858698273 scopus 로고    scopus 로고
    • Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
    • Casas P, Mazel J, Owezarski P,. Unsupervised network intrusion detection systems: detecting the unknown without knowledge, Computer Communications 2012; 35 (7): 772-783.
    • (2012) Computer Communications , vol.35 , Issue.7 , pp. 772-783
    • Casas, P.1    Mazel, J.2    Owezarski, P.3
  • 77
    • 33847303101 scopus 로고    scopus 로고
    • BLINC: Multilevel traffic classification in the dark
    • DOI 10.1145/1090191.1080119
    • Karagiannis T, Papagiannaki K, Faloutsos M,. BLINC: multilevel traffic classification in the dark, In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications: SIGCOMM'05. ACM: New York, 2005; 229-240. (Pubitemid 46323507)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 229-240
    • Karagiannis, T.1    Papagiannaki, K.2    Faloutsos, M.3
  • 79
    • 84904158680 scopus 로고    scopus 로고
    • Anomaly detection through blind flow analysis inside a local network
    • Vancouver, WA, [31 October 2013]
    • McLeod R, Nagaonkar V,. Anomaly detection through blind flow analysis inside a local network, In CERT FloCon Workshop: Vancouver, WA, 2006. Available: http://www.cert.org/flocon/2006/presentations/anomaly-detect2006.pdf [31 October 2013].
    • (2006) CERT FloCon Workshop
    • McLeod, R.1    Nagaonkar, V.2
  • 81
    • 84904180074 scopus 로고    scopus 로고
    • Network host classification using statistical analysis of flow data
    • New Orleans, LA, [31 October 2013]
    • Kent A, Fisk M, Gavrilov E,. Network host classification using statistical analysis of flow data, In CERT FloCon Workshop: New Orleans, LA, 2010. Available: http://www.cert.org/flocon/2010/presentations/Kent- NetworkHostClassification.pdf [31 October 2013].
    • (2010) CERT FloCon Workshop
    • Kent, A.1    Fisk, M.2    Gavrilov, E.3
  • 82
    • 84904156819 scopus 로고    scopus 로고
    • Locality based analysis of network flows
    • Pittsburgh, PA, [31 October 2013]
    • McHugh J,. Locality based analysis of network flows, In CERT FloCon Workshop: Pittsburgh, PA, 2004. Available: http://www.cert.org/flocon/2004/ proceedings/flocon2004-analysis-mchugh.pdf [31 October 2013].
    • (2004) CERT FloCon Workshop
    • McHugh, J.1
  • 83
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • DOI 10.1145/1090191.1080118
    • Lakhina A, Crovella M, Diot C,. Mining anomalies using traffic feature distributions, SIGCOMM Computer Communication Review 2005; 35 (4): 217-228. (Pubitemid 46323506)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 84
    • 84904160449 scopus 로고    scopus 로고
    • Towards a high-speed router-based anomaly/intrusion detection system
    • Philadelphia, PA, [20 May 2014]
    • Li Z, Gao Y, Chen Y,. Towards a high-speed router-based anomaly/intrusion detection system, In Proceedings of the Special Interest Group on Data Communication (SIGCOMM): Philadelphia, PA, 2005. Available: http://conferences. sigcomm.org/sigcomm/2005/poster-121.pdf [20 May 2014].
    • (2005) Proceedings of the Special Interest Group on Data Communication (SIGCOMM)
    • Li, Z.1    Gao, Y.2    Chen, Y.3
  • 85
    • 84855161053 scopus 로고    scopus 로고
    • Correlations between quiescent ports in network flows
    • Pittsburgh, PA, [31 October 2013]
    • McNutt J, De Shon M,. Correlations between quiescent ports in network flows, In CERT FloCon Workshop: Pittsburgh, PA, 2005. Available: http://www.cert.org/flocon/2005/presentations/McNutt-Correlation-FloCon2005.pdf [31 October 2013].
    • (2005) CERT FloCon Workshop
    • McNutt, J.1    De Shon, M.2
  • 88
    • 84904165427 scopus 로고    scopus 로고
    • A flexible DDoS detection system using IPFIX, in
    • Savannah, GA, [31 October 2013]
    • Zseby T, Hirsch T,. A flexible DDoS detection system using IPFIX, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/ 2008/presentations/zseby-Flocon2008.pdf [31 October 2013].
    • (2008) CERT FloCon Workshop
    • Zseby, T.1    Hirsch, T.2
  • 91
    • 84904215576 scopus 로고    scopus 로고
    • Protographs: Graph-based approach to NetFlow analysis
    • Salt Lake City, UT, [31 October 2013]
    • Janies J,. Protographs: graph-based approach to NetFlow analysis, In CERT FloCon Workshop: Salt Lake City, UT, 2011. Available: http://www.cert.org/ flocon/2011/presentations/Janies-Protographs.pdf [31 October 2013].
    • (2011) CERT FloCon Workshop
    • Janies, J.1
  • 94
    • 84904203378 scopus 로고    scopus 로고
    • Entropy in IP Darkspace data
    • Austin, TX, [31 October 2013]
    • Zseby T,. Entropy in IP Darkspace data, In CERT FloCon Workshop: Austin, TX, 2012. Available: http://www.cert.org/flocon/2012/presentations/zseby- entropy-in-IP-darkspace-data.pdf [31 October 2013].
    • (2012) CERT FloCon Workshop
    • Zseby, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.