메뉴 건너뛰기




Volumn 18, Issue 1, 2015, Pages 435-451

Surveillance of anomaly and misuse in critical networks to counter insider threats using computational intelligence

Author keywords

Computational intelligence log files; Digital evidence; Insider threat; Network forensics; Network traffic

Indexed keywords

COMPUTATION THEORY; INTELLIGENT COMPUTING; SECURITY OF DATA;

EID: 84925534015     PISSN: 13867857     EISSN: 15737543     Source Type: Journal    
DOI: 10.1007/s10586-014-0403-y     Document Type: Article
Times cited : (24)

References (63)
  • 2
    • 0012282403 scopus 로고    scopus 로고
    • Computer intrusion: detecting masquerades
    • Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A.F.: Computer intrusion: detecting masquerades. Stat. Sci. 16(1), 58–74 (2001)
    • (2001) Stat. Sci. , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1    DuMouchel, W.2    Ju, W.-H.3    Karr, A.F.4
  • 3
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)
    • (2005) Comput. Secur. , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 4
    • 81855197007 scopus 로고    scopus 로고
    • An efficient intrusion detection system based on support vector machines and gradually feature removal method
    • Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39, 424–430 (2012)
    • (2012) Expert Syst. Appl. , vol.39 , pp. 424-430
    • Li, Y.1    Xia, J.2    Zhang, S.3    Yan, J.4    Ai, X.5    Dai, K.6
  • 5
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University of Technology, Tech
    • Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University of Technology, Tech. Rep. 2000
    • (2000) Rep
    • Axelsson, S.1
  • 6
    • 85067752996 scopus 로고    scopus 로고
    • Snort
    • Snort. http://www.snort.org
  • 7
    • 85067755681 scopus 로고    scopus 로고
    • Tripwire
    • Tripwire. http://www.tripwire.com/
  • 9
    • 84863381941 scopus 로고    scopus 로고
    • Detecting anomalous insiders in collaborative information systems
    • Chen, Y., Nyemba, S., Malin, B.: Detecting anomalous insiders in collaborative information systems. IEEE Trans. Dependable Secur. Comput. 9(3), 332–344 (2012)
    • (2012) IEEE Trans. Dependable Secur. Comput. , vol.9 , Issue.3 , pp. 332-344
    • Chen, Y.1    Nyemba, S.2    Malin, B.3
  • 11
    • 80051527078 scopus 로고    scopus 로고
    • Attack pattern discovery in forensic investigation of network attacks
    • Zhu, Ying: Attack pattern discovery in forensic investigation of network attacks. IEEE J. Sel. Areas Commun. 29(7), 1349–1357 (2011)
    • (2011) IEEE J. Sel. Areas Commun. , vol.29 , Issue.7 , pp. 1349-1357
    • Zhu, Y.1
  • 12
    • 0033295259 scopus 로고    scopus 로고
    • Bro: a system for detecting network intruders in real-time
    • Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435–2463 (1999)
    • (1999) Comput. Netw. , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 19
    • 18844379137 scopus 로고    scopus 로고
    • Display-only file server: a solution against information theft due to insider attack
    • Yang, Y. Tzi-cker, C.: Display-only file server: a solution against information theft due to insider attack. In: Proceedings of the ACM Workshop on Digital Rights, 31–39 2004
    • (2004) Proceedings of the ACM Workshop on Digital Rights , pp. 31-39
    • Yang, Y.1    Tzi-cker, C.2
  • 25
    • 84857501902 scopus 로고    scopus 로고
    • C.P.:Reflections on the insider threat
    • Springer, New York:
    • Pfleeger, C.P.:Reflections on the insider threat. In: Insider Attack and Cyber Security: Beyond the Hacker, pp. 5–16. Springer, New York (2008)
    • (2008) Insider Attack and Cyber Security: Beyond the Hacker , pp. 5-16
  • 26
    • 80052621067 scopus 로고    scopus 로고
    • Insiders and insider threats—an overview of definitions and mitigation techniques
    • Hunker, J., Probst, C.W.: Insiders and insider threats—an overview of definitions and mitigation techniques. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2(1), 4–27 (2011)
    • (2011) J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. , vol.2 , Issue.1 , pp. 4-27
    • Hunker, J.1    Probst, C.W.2
  • 29
    • 33847664064 scopus 로고    scopus 로고
    • Capturing user intent for information. Dissertation, Ph.D
    • Nguyen, H.: Capturing user intent for information. Dissertation, Ph.D., University of Connecticut (2005)
    • (2005) University of Connecticut
    • Nguyen, H.1
  • 31
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E.: A framework for understanding and predicting insider attacks. Comput. Secur. 21(6), 526–531 (2002)
    • (2002) Comput. Secur. , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.1
  • 33
    • 0010886042 scopus 로고    scopus 로고
    • A framework for characterization of insider computer misuse
    • Tuglular, T., Spafford, E.: A framework for characterization of insider computer misuse. Unpublished paper, 1997
    • (1997) Unpublished paper
    • Tuglular, T.1    Spafford, E.2
  • 36
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management
    • Thomas, R., Sandhu, S.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP 11th International Conference on Database Securty, 166–181 Aug 1997
    • (1997) Proceedings of the IFIP 11th International Conference on Database Securty , pp. 166-181
    • Thomas, R.1    Sandhu, S.2
  • 37
    • 55549122324 scopus 로고    scopus 로고
    • Situation-based access control: privacy management via modeling of patient data access scenarios
    • Peleg, M., Beimel, D., Dori, D., Denekamp, Y.: Situation-based access control: privacy management via modeling of patient data access scenarios. J. Biomed. Inform. 41(6), 1028–1040 (2008)
    • (2008) J. Biomed. Inform. , vol.41 , Issue.6 , pp. 1028-1040
    • Peleg, M.1    Beimel, D.2    Dori, D.3    Denekamp, Y.4
  • 38
    • 3042852281 scopus 로고    scopus 로고
    • Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
    • Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Elsevier J. Digit. Investig. 1, 28–43 (2004)
    • (2004) Elsevier J. Digit. Investig. , vol.1 , pp. 28-43
    • Casey, E.1
  • 39
    • 0036870198 scopus 로고    scopus 로고
    • Network forensics analysis
    • Corey, V.: Network forensics analysis. IEEE Internet Comput. 6(6), 60–66 (2002)
    • (2002) IEEE Internet Comput. , vol.6 , Issue.6 , pp. 60-66
    • Corey, V.1
  • 40
    • 4243105024 scopus 로고    scopus 로고
    • The discipline of internet forensics
    • Berghel, H.: The discipline of internet forensics. Commun. ACM 46(8), 15–20 (2003)
    • (2003) Commun. ACM , vol.46 , Issue.8 , pp. 15-20
    • Berghel, H.1
  • 41
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6(3), 151–180 (1998)
    • (1998) J. Comput. Secur. , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 42
    • 33745463455 scopus 로고    scopus 로고
    • Learning classifiers for misuse detection using a bag of system calls representation
    • Kang, D.-K., Fuller, D., Honavar, V.: Learning classifiers for misuse detection using a bag of system calls representation. In: Proceedings from the 6th Annual IEEE SMC IAW, 118–125 June 2005
    • (2005) Proceedings from the 6th Annual IEEE SMC IAW , pp. 118-125
    • Kang, D.-K.1    Fuller, D.2    Honavar, V.3
  • 47
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: a specification-based approach
    • Ko, C.: Execution monitoring of security-critical programs in distributed systems: a specification-based approach. In: Proceedings of the IEEE Symposium on Security and Privacy, 175–187 April 1997
    • (1997) Proceedings of the IEEE Symposium on Security and Privacy , pp. 175-187
    • Ko, C.1
  • 48
    • 0036321445 scopus 로고    scopus 로고
    • Use of k-nearest neighbor classifier for intrusion detection
    • Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. J. Comput. Secur. 21(5), 439–448 (2002)
    • (2002) J. Comput. Secur. , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 52
    • 85067745621 scopus 로고    scopus 로고
    • Netdetector
    • Netdetector. http://www.niksun.com/product.php?id=4
  • 53
    • 85067778472 scopus 로고    scopus 로고
    • Networkminer
    • Networkminer. http://networkminer.wiki.sourceforge.net/NetworkMiner
  • 54
    • 85067747203 scopus 로고    scopus 로고
    • Netintercept
    • Netintercept. http://sandstorm.net/products/netintercept
  • 55
    • 85067749149 scopus 로고    scopus 로고
    • Wireshark
    • Wireshark. http://www.wireshark.org
  • 57
    • 48749114837 scopus 로고    scopus 로고
    • Internet attack knowledge discovery via clusters and cliques of attack traces
    • Pouget, F., Dacier, M., Zimmerman, J., Clark, A., Mohay, G.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. Inf. Assur. Secur. 1, 21–32 (2006)
    • (2006) J. Inf. Assur. Secur. , vol.1 , pp. 21-32
    • Pouget, F.1    Dacier, M.2    Zimmerman, J.3    Clark, A.4    Mohay, G.5
  • 58
    • 48749129421 scopus 로고    scopus 로고
    • A framework for attack patterns’ discovery in honeynet data
    • Thonnard, O., Dacier, M.: A framework for attack patterns’ discovery in honeynet data. Digit. Investig. 8, S128–S139 (2008)
    • (2008) Digit. Investig. , vol.8 , pp. 128-139
    • Thonnard, O.1    Dacier, M.2
  • 60
    • 85067766056 scopus 로고    scopus 로고
    • Yegneswaran, V., Barford, P., Paxson, V.: Using honeypots for internet situational awareness. In Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV), College Park, Nov 2005
    • Yegneswaran, V., Barford, P., Paxson, V.: Using honeypots for internet situational awareness. In Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV), College Park, Nov 2005


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.