메뉴 건너뛰기




Volumn 70, Issue , 2014, Pages 103-117

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks

Author keywords

Adaptive system; Anomaly detection; Autonomic computing; Clustering; Intrusion detection; Network security; Web security

Indexed keywords

ADAPTIVE SYSTEMS; COMPUTER HARDWARE DESCRIPTION LANGUAGES; DATA STREAMS; HTTP; INTRUSION DETECTION; NEAREST NEIGHBOR SEARCH; NETWORK SECURITY;

EID: 84908477169     PISSN: 09507051     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.knosys.2014.06.018     Document Type: Article
Times cited : (93)

References (55)
  • 1
    • 84908476074 scopus 로고    scopus 로고
    • Snort (retrieved February 2014)
    • Snort. Snort, 2014. < http://www.snort.org/ > (retrieved February 2014).
    • (2014) Snort
  • 2
    • 0032676506 scopus 로고    scopus 로고
    • A data mining framework for building intrusion detection models
    • Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, A data mining framework for building intrusion detection models, in: IEEE S&P, 1999, pp. 120-132.
    • (1999) IEEE S&P , pp. 120-132
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 3
    • 84908490563 scopus 로고    scopus 로고
    • Automatically inferring the evolution of malicious activity on the internet
    • Shobha Venkataraman, David Brumley, Subhabrata Sen, Oliver Spatscheck, Automatically inferring the evolution of malicious activity on the internet, in: NDSS, 2013.
    • (2013) NDSS
    • Venkataraman, S.1    Brumley, D.2    Sen, S.3    Spatscheck, O.4
  • 5
    • 33750333036 scopus 로고    scopus 로고
    • Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
    • Wei Wang, Xiaohong Guan, Xiangliang Zhang, and Liwei Yang Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data Comput. Secur. 25 7 2006 539 550
    • (2006) Comput. Secur. , vol.25 , Issue.7 , pp. 539-550
    • Wang, W.1    Guan, X.2    Zhang, X.3    Yang, L.4
  • 6
    • 85178287263 scopus 로고    scopus 로고
    • Drebin: Efficient and explainable detection of android malware in your pocket
    • Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, Drebin: efficient and explainable detection of android malware in your pocket, in: NDSS, 2014.
    • (2014) NDSS
    • Arp, D.1    Spreitzenbarth, M.2    Hubner, M.3    Gascon, H.4    Rieck, K.5
  • 7
    • 84866608644 scopus 로고    scopus 로고
    • Profiledroid: Multi-layer profiling of android applications
    • Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, Profiledroid: multi-layer profiling of android applications, in: MOBICOM, 2012, pp. 137-148.
    • (2012) MOBICOM , pp. 137-148
    • Wei, X.1    Gomez, L.2    Neamtiu, I.3    Faloutsos, M.4
  • 8
    • 50249170401 scopus 로고    scopus 로고
    • Casting out demons: Sanitizing training data for anomaly sensors
    • Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Angelos D. Keromytis, Casting out demons: sanitizing training data for anomaly sensors, in: IEEE S&P, 2008, pp. 81-95.
    • (2008) IEEE S&P , pp. 81-95
    • Cretu, G.F.1    Stavrou, A.2    Locasto, M.E.3    Stolfo, S.J.4    Keromytis, A.D.5
  • 9
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm: A provocative discussion
    • Carrie Gates, Carol Taylor, Challenging the anomaly detection paradigm: a provocative discussion, in: NSPW, 2006, pp. 21-29.
    • (2006) NSPW , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 10
    • 85166317163 scopus 로고    scopus 로고
    • Approaches to online learning and concept drift for user identification in computer security
    • Terran Lane, Carla E. Brodley, Approaches to online learning and concept drift for user identification in computer security, in: KDD, 1998, pp. 259-263.
    • (1998) KDD , pp. 259-263
    • Lane, T.1    Brodley, C.E.2
  • 11
    • 78650924299 scopus 로고    scopus 로고
    • (retrieved February 2014)
    • KDD-Data, Kdd cup 1999 Data, 1999. < http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html > (retrieved February 2014).
    • (1999) KDD-Data, Kdd Cup 1999 Data
  • 13
    • 84908495077 scopus 로고    scopus 로고
    • (retrieved February 2014)
    • IBM, Autonomic Computing, 2014. < http://www.ibm.com/autonomic > (retrieved February 2014).
    • (2014) IBM, Autonomic Computing
  • 14
    • 33847172327 scopus 로고    scopus 로고
    • Clustering by passing messages between data points
    • Brendan J. Frey, and Delbert Dueck Clustering by passing messages between data points Science 315 5814 2007 972 976
    • (2007) Science , vol.315 , Issue.5814 , pp. 972-976
    • Frey, B.J.1    Dueck, D.2
  • 15
    • 84901851210 scopus 로고    scopus 로고
    • Data streaming with affinity propagation
    • Xiangliang Zhang, Cyril Furtlehner, Michèle Sebag, Data streaming with affinity propagation, in: ECML/PKDD, 2008.
    • (2008) ECML/PKDD
    • Xiangliang Zhang, C.1
  • 17
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Matthias Schonlau, and Martin Theus Detecting masquerades in intrusion detection based on unpopular commands Inf. Process. Lett. 76 1-2 2000 33 38
    • (2000) Inf. Process. Lett. , vol.76 , Issue.12 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 18
    • 55949124178 scopus 로고    scopus 로고
    • Fast intrusion detection based on a non-negative matrix factorization model
    • Xiaohong Guan, Wei Wang, and Xiangliang Zhang Fast intrusion detection based on a non-negative matrix factorization model J. Network Comput. Appl. 32 1 2009 31 44
    • (2009) J. Network Comput. Appl. , vol.32 , Issue.1 , pp. 31-44
    • Guan, X.1    Wang, W.2    Zhang, X.3
  • 19
    • 37049002837 scopus 로고    scopus 로고
    • Processing of massive audit data streams for real-time anomaly intrusion detection
    • Wei Wang, Xiaohong Guan, and Xiangliang Zhang Processing of massive audit data streams for real-time anomaly intrusion detection Comput. Commun. 31 1 2008 58 72
    • (2008) Comput. Commun. , vol.31 , Issue.1 , pp. 58-72
    • Wang, W.1    Guan, X.2    Zhang, X.3
  • 20
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Ke Wang, Salvatore J. Stolfo, Anomalous payload-based network intrusion detection, in: RAID, 2004, pp. 203-222.
    • (2004) RAID , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 21
    • 84872967561 scopus 로고    scopus 로고
    • Anomaly intrusion detection based on pls feature extraction and core vector machine
    • Xu sheng Gan, Jing shun Duanmu, Jia fu Wang, and Wei Cong Anomaly intrusion detection based on pls feature extraction and core vector machine Knowl.-Based Syst. 40 2013 1 6
    • (2013) Knowl.-Based Syst. , vol.40 , pp. 1-6
    • Gan, X.S.1    Duanmu, J.S.2    Wang, J.F.3    Cong, W.4
  • 22
    • 14844319067 scopus 로고    scopus 로고
    • Anomaly detection of web-based attacks
    • Christopher Krügel, Giovanni Vigna, Anomaly detection of web-based attacks, in: ACM CCS, 2003, pp. 251-261.
    • (2003) ACM CCS , pp. 251-261
    • Christopher Krügel, G.1
  • 23
    • 38149142569 scopus 로고    scopus 로고
    • Comparing anomaly detection techniques for http
    • Kenneth L. Ingham, Hajime Inoue, Comparing anomaly detection techniques for http, in: RAID, 2007, pp. 42-62.
    • (2007) RAID , pp. 42-62
    • Ingham, K.L.1    Inoue, H.2
  • 24
    • 85180633963 scopus 로고    scopus 로고
    • Spectrogram: A mixture-of-markov-chains model for anomaly detection in web traffic
    • Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo, Spectrogram: a mixture-of-markov-chains model for anomaly detection in web traffic, in: NDSS, 2009.
    • (2009) NDSS
    • Song, Y.1    Keromytis, A.D.2    Stolfo, S.J.3
  • 25
    • 79955482186 scopus 로고    scopus 로고
    • Hmmpayl: An intrusion detection system based on hidden markov models
    • Davide Ariu, Roberto Tronci, and Giorgio Giacinto Hmmpayl: an intrusion detection system based on hidden markov models Comput. Secur. 30 4 2011 221 241
    • (2011) Comput. Secur. , vol.30 , Issue.4 , pp. 221-241
    • Ariu, D.1    Tronci, R.2    Giacinto, G.3
  • 26
    • 84908490561 scopus 로고    scopus 로고
    • Warningbird: Detecting suspicious urls in twitter stream
    • Sangho Lee, Jong Kim, Warningbird: detecting suspicious urls in twitter stream, in: NDSS, 2012.
    • (2012) NDSS
  • 28
    • 84866485165 scopus 로고    scopus 로고
    • Policy-enhanced anfis model to counter soap-related attacks
    • Gaik-Yee Chan, Chien-Sing Lee, and Swee-Huay Heng Policy-enhanced anfis model to counter soap-related attacks Knowl.-Based Syst. 35 2012 64 76
    • (2012) Knowl.-Based Syst. , vol.35 , pp. 64-76
    • Chan, G.-Y.1    Lee, C.-S.2    Heng, S.-H.3
  • 29
    • 84874750531 scopus 로고    scopus 로고
    • Discovering fuzzy association rule patterns and increasing sensitivity analysis of xml-related attacks
    • Gaik-Yee Chan, Chien-Sing Lee, and Swee-Huay Heng Discovering fuzzy association rule patterns and increasing sensitivity analysis of xml-related attacks J. Network Comput. Appl. 36 2 2013 829 842
    • (2013) J. Network Comput. Appl. , vol.36 , Issue.2 , pp. 829-842
    • Chan, G.-Y.1    Lee, C.-S.2    Heng, S.-H.3
  • 30
    • 80053139318 scopus 로고    scopus 로고
    • Defending web services against denial of service attacks using client puzzles
    • Suriadi Suriadi, Douglas Stebila, Andrew J. Clark, Hua Liu, Defending web services against denial of service attacks using client puzzles, in: ICWS, 2011, pp. 25-32.
    • (2011) ICWS , pp. 25-32
    • Suriadi, S.1    Stebila, D.2    Clark, A.J.3    Liu, H.4
  • 32
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, and Sal Stolfo A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data Appl. Data Mining Comput. Secur. 2002
    • (2002) Appl. Data Mining Comput. Secur.
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 34
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • Kingsly Leung, Christopher Leckie, Unsupervised anomaly detection in network intrusion detection using clusters, in: Proc. 28th Australasian CS Conf., CRPITV, vol. 38, 2005, pp. 333-342.
    • (2005) Proc. 28th Australasian CS Conf., CRPITV , vol.38 , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 35
    • 76649108863 scopus 로고    scopus 로고
    • Adaptive anomaly detection via self-calibration and dynamic updating
    • Gabriela F. Cretu, Angelos Stavrou, Michael E. Locasto, Salvatore J. Stolfo, Adaptive anomaly detection via self-calibration and dynamic updating, in: RAID, 2009, pp. 41-60.
    • (2009) RAID , pp. 41-60
    • Cretu, G.F.1    Stavrou, A.2    Locasto, M.E.3    Stolfo, S.J.4
  • 36
    • 76649111697 scopus 로고    scopus 로고
    • Runtime monitoring and dynamic reconfiguration for intrusion detection systems
    • Martin Rehák, Eugen Staab, Volker Fusenig, Michal Pechoucek, Martin Grill, Jan Stiborek, Karel Bartos, Thomas Engel, Runtime monitoring and dynamic reconfiguration for intrusion detection systems, in: RAID, 2009, pp. 61-80.
    • (2009) RAID , pp. 61-80
    • Martin Rehák, E.1
  • 37
    • 84896405910 scopus 로고    scopus 로고
    • Adaptive and online data anomaly detection for wireless sensor systems
    • (available online first)
    • Murad A. Rassama, Anazida Zainala, and Mohd. Aizaini Maarofaand Adaptive and online data anomaly detection for wireless sensor systems Knowl.-Based Syst. 2014 (available online first)
    • (2014) Knowl.-Based Syst.
    • Rassama, M.A.1    Zainala, A.2    Aizaini Maarofaand, M.3
  • 38
    • 49549120416 scopus 로고    scopus 로고
    • An adaptive automatically tuning intrusion detection system
    • Zhenwei Yu, Jeffrey J.P. Tsai, and Thomas J. Weigert An adaptive automatically tuning intrusion detection system ACM Trans. Auton. Adapt. Syst. 3 3 2008
    • (2008) ACM Trans. Auton. Adapt. Syst. , vol.3 , Issue.3
    • Yu, Z.1    Tsai, J.J.P.2    Weigert, T.J.3
  • 39
    • 76649142367 scopus 로고    scopus 로고
    • Protecting a moving target: Addressing web application concept drift
    • Federico Maggi, William K. Robertson, Christopher Krügel, Giovanni Vigna, Protecting a moving target: addressing web application concept drift, in: RAID, 2009, pp. 21-40.
    • (2009) RAID , pp. 21-40
    • Federico, M.1    William, K.R.2    Christopher, K.3    Giovanni, V.4
  • 40
    • 85180537732 scopus 로고    scopus 로고
    • Effective anomaly detection with scarce training data
    • William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna, Effective anomaly detection with scarce training data, in: NDSS, 2010.
    • (2010) NDSS
    • Robertson, W.K.1    Maggi, F.2    Kruegel, C.3    Vigna, G.4
  • 45
    • 0034247885 scopus 로고    scopus 로고
    • Sequential Karhunen-Loeve basis extraction and its application to images
    • Avraham Levy, and Michael Lindenbaum Sequential Karhunen-Loeve basis extraction and its application to images IEEE Trans. Image Process. 9 2000 1371 1374
    • (2000) IEEE Trans. Image Process. , vol.9 , pp. 1371-1374
    • Levy, A.1    Lindenbaum, M.2
  • 46
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • Yihua Liao, V. Rao Vemuri, Using text categorization techniques for intrusion detection, in: USENIX Security Symposium, 2002, pp. 51-59.
    • (2002) USENIX Security Symposium , pp. 51-59
    • Liao, Y.1    Rao Vemuri, V.2
  • 47
    • 71749108310 scopus 로고    scopus 로고
    • Constructing attribute weights from computer audit data for effective intrusion detection
    • Wei Wang, Xiangliang Zhang, and Sylvain Gombault Constructing attribute weights from computer audit data for effective intrusion detection J. Sys. Soft. 82 12 2009 1974 1981
    • (2009) J. Sys. Soft. , vol.82 , Issue.12 , pp. 1974-1981
    • Wang, W.1    Zhang, X.2    Gombault, S.3
  • 51
    • 83455223163 scopus 로고    scopus 로고
    • Using generalization and characterization techniques in the anomaly-based detection of web attacks
    • William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer, Using generalization and characterization techniques in the anomaly-based detection of web attacks, in: NDSS, 2006.
    • (2006) NDSS
    • William, K.1    Robertson2
  • 52
    • 79955702502 scopus 로고    scopus 로고
    • LIBSVM: A library for support vector machines
    • Software
    • Chih-Chung Chang, and Chih-Jen Lin LIBSVM: a library for support vector machines ACM Trans. Intell. Syst. Technol. 2 2011 27:1 27:27 Software available at http://www.csie.ntu.edu.tw/∼cjlin/libsvm.
    • (2011) ACM Trans. Intell. Syst. Technol. , vol.2 , pp. 271-2727
    • Chang, C.-C.1    Lin, C.-J.2
  • 53
    • 71049172937 scopus 로고    scopus 로고
    • Toward autonomic grids: Analyzing the job flow with affinity streaming
    • Xiangliang Zhang, Cyril Furtlehner, Julien Perez, Cécile Germain-Renaud, Michèle Sebag, Toward autonomic grids: analyzing the job flow with affinity streaming, in: KDD, 2009, pp. 987-996.
    • (2009) KDD , pp. 987-996
    • Xiangliang Zhang, C.1
  • 54
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • John McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory ACM Trans. Inf. Syst. Secur. 3 4 2000 262 294
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 55
    • 77949788147 scopus 로고    scopus 로고
    • Attribute normalization in network intrusion detection
    • Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, Attribute normalization in network intrusion detection, in: ISPAN, 2009, pp. 448-453.
    • (2009) ISPAN , pp. 448-453
    • Wang, W.1    Zhang, X.2    Gombault, S.3    Knapskog, S.J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.