메뉴 건너뛰기




Volumn , Issue , 2014, Pages 175-182

Context infusion in semantic link networks to detect cyber-attacks: A flow-based detection approach

Author keywords

context; contextual information; cyber security; Intrusion detection; network flows; semantic link networks

Indexed keywords

INTRUSION DETECTION; SEMANTICS;

EID: 84906968815     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSC.2014.29     Document Type: Conference Paper
Times cited : (12)

References (25)
  • 7
    • 85075837457 scopus 로고    scopus 로고
    • Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
    • San Jose, CA
    • G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection," in Proceedings of the 17th conference on Security(USENIX'08), San Jose, CA, 2008, pp. 139-154.
    • (2008) Proceedings of the 17th Conference on Security(USENIX'08) , pp. 139-154
    • Gu, G.1    Perdisci, R.2    Zhang, J.3    Lee, W.4
  • 9
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions," SIGCOMM Comput. Commun. Rev., vol. 35, no. 4, pp. 217-228, 2005.
    • (2005) SIGCOMM Comput. Commun. Rev. , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 11
    • 71649094670 scopus 로고    scopus 로고
    • Using semantic networks and context in search for relevant software engineering Artifacts
    • Journal on Data Semantics
    • G. Karabatis, Z. Chen, V. Janeja, T. Lobo, M. Advani, M. Lindvall, et al., "Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts," Journal on Data Semantics, LNCS 5880, vol. 14, no. pp. 74-104, 2009.
    • (2009) LNCS 5880 , vol.14 , pp. 74-104
    • Karabatis, G.1    Chen, Z.2    Janeja, V.3    Lobo, T.4    Advani, M.5    Lindvall, M.6
  • 13
    • 66149184544 scopus 로고    scopus 로고
    • Communities and emerging semantics in semantic link network: Discovery and learning
    • H. Zhuge, "Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning," IEEE Trans. on Knowl. and Data Eng., vol. 21, no. 6, pp. 785-799, 2009.
    • (2009) IEEE Trans. on Knowl. and Data Eng. , vol.21 , Issue.6 , pp. 785-799
    • Zhuge, H.1
  • 14
    • 0031245667 scopus 로고    scopus 로고
    • Context-aware applications: From the laboratory to the marketplace
    • P. J. Brown, J. D. Bovey, and C. Xian, "Context-Aware Applications: From the Laboratory to the Marketplace," IEEE Personal Communications, vol. 4, no. 5, pp. 58-64, 1997.
    • (1997) IEEE Personal Communications , vol.4 , Issue.5 , pp. 58-64
    • Brown, P.J.1    Bovey, J.D.2    Xian, C.3
  • 16
  • 21
    • 0027540520 scopus 로고
    • Selected algorithms of machine learning from examples
    • J. W. Grzymala-Busse, "Selected Algorithms of Machine Learning from Examples," Fundamenta Informaticae, vol. 1, no. 8, pp. 193-207, 1993.
    • (1993) Fundamenta Informaticae , vol.1 , Issue.8 , pp. 193-207
    • Grzymala-Busse, J.W.1
  • 23
    • 84859430323 scopus 로고    scopus 로고
    • Toward developing a systematic approach to generate benchmark datasets for intrusion detection
    • A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection," Computers & Security, vol. 31, no. 3, pp. 357-374, 2012.
    • (2012) Computers & Security , vol.31 , Issue.3 , pp. 357-374
    • Shiravi, A.1    Shiravi, H.2    Tavallaee, M.3    Ghorbani, A.A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.