메뉴 건너뛰기




Volumn 17, Issue 4, 2015, Pages 2367-2408

An entropy-based network anomaly detection method

Author keywords

Anomaly detection; Entropy; Malware detection

Indexed keywords


EID: 84930363113     PISSN: None     EISSN: 10994300     Source Type: Journal    
DOI: 10.3390/e17042367     Document Type: Article
Times cited : (173)

References (140)
  • 1
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.E. An intrusion-detection model. IEEE Trans. Softw. Eng. 1987, 13, 222-232.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , pp. 222-232
    • Denning, D.E.1
  • 2
    • 26944450506 scopus 로고    scopus 로고
    • USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection
    • Ho, T., Cheung, D., Liu, H., Eds, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
    • Li, Z.; Das, A.; Zhou, J. USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. In Advances in Knowledge Discovery and Data Minin, Ho, T., Cheung, D., Liu, H., Eds.; Volume 3518, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2005; pp 702-712.
    • (2005) Advances in Knowledge Discovery and Data Minin , vol.3518 , pp. 702-712
    • Li, Z.1    Das, A.2    Zhou, J.3
  • 3
    • 84890880565 scopus 로고    scopus 로고
    • Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems
    • Cheng, T.H.; Lin, Y.D.; Lai, Y.C.; Lin, P.C. Evasion Techniques: Sneaking through Your Intrusion Detection/Prevention Systems. IEEE Commun. Surv. Tutor. 2012, 14, 1011-1020.
    • (2012) IEEE Commun. Surv. Tutor. , vol.14 , pp. 1011-1020
    • Cheng, T.H.1    Lin, Y.D.2    Lai, Y.C.3    Lin, P.C.4
  • 5
    • 80955142736 scopus 로고    scopus 로고
    • Analysis of update delays in signature-based network intrusion detection systems
    • Gascon, H.; Orfila, A.; Blasco, J. Analysis of update delays in signature-based network intrusion detection systems. Comput. Secur. 2011, 30, 613-624.
    • (2011) Comput. Secur. , vol.30 , pp. 613-624
    • Gascon, H.1    Orfila, A.2    Blasco, J.3
  • 10
    • 79957530146 scopus 로고    scopus 로고
    • Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
    • Xiang, Y.; Li, K.; Zhou, W. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Trans. Inf. Forensics Secur. 2011, 6, 426-437.
    • (2011) IEEE Trans. Inf. Forensics Secur. , vol.6 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 12
    • 84930332721 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • HP-The Bot Threat. Available online: http://www.bitpipe.com/detail/RES/1384218191_706. html (accessed on 16 April 2015).
  • 13
    • 84930320018 scopus 로고    scopus 로고
    • Sophos-Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. Available online, accessed on 16 April
    • Sophos-Security Threat Report 2014 Smarter, Shadier, Stealthier Malware. Available online: https://cccure.training/m/articles/view/Sophos-Security-Threat-Report-2014 (accessed on 16 April 2015).
    • (2015)
  • 16
    • 84930334688 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • NfSen-Netflow Sensor. Available online: http://nfsen.sourceforge.net (accessed on 16 April 2015).
  • 19
    • 84930344566 scopus 로고    scopus 로고
    • NtopNg-High-Speed Web-based Traffic Analysis and Flow Collection
    • Available online, accessed on 16 April 2015
    • NtopNg-High-Speed Web-based Traffic Analysis and Flow Collection. Available online:http://www.ntop.org (accessed on 16 April 2015).
  • 25
    • 7544223741 scopus 로고    scopus 로고
    • A Survey of Outlier Detection Methodologies
    • Hodge, V.; Austin, J. A Survey of Outlier Detection Methodologies. Artif. Intell. Rev. 2004, 22, 85-126.
    • (2004) Artif. Intell. Rev. , vol.22 , pp. 85-126
    • Hodge, V.1    Austin, J.2
  • 27
    • 34250315640 scopus 로고    scopus 로고
    • An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends
    • Patcha, A.; Park, J.M. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Comput. Netw. 2007, 51, 3448-3470.
    • (2007) Comput. Netw. , vol.51 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 34
    • 27144518261 scopus 로고    scopus 로고
    • A novel anomaly detection scheme based on principal component classifier
    • in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, USA, 19-22 November
    • Shyu, M.-L.; Chen, S.-C.; Sarinnapakorn, K.; Chang, L. A novel anomaly detection scheme based on principal component classifier. In Proceedings of IEEE Foundations and New Directions of Data Mining Worksho, in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, FL, USA, 19-22 November 2003; pp 171-179.
    • (2003) Proceedings of IEEE Foundations and New Directions of Data Mining Worksho , pp. 171-179
    • Shyu, M.-L.1    Chen, S.-C.2    Sarinnapakorn, K.3    Chang, L.4
  • 35
    • 84878266577 scopus 로고    scopus 로고
    • Anomaly Detection via Online Oversampling Principal Component Analysis
    • Lee, Y.J.; Yeh, Y.R.; Wang, Y.C.F. Anomaly Detection via Online Oversampling Principal Component Analysis. IEEE Trans. Knowl. Data Eng. 2013, 25, 1460-1470.
    • (2013) IEEE Trans. Knowl. Data Eng. , vol.25 , pp. 1460-1470
    • Lee, Y.J.1    Yeh, Y.R.2    Wang, Y.C.F.3
  • 36
    • 59949095579 scopus 로고    scopus 로고
    • Network Anomaly Detection Based on Wavelet Analysis
    • Lu, W.; Ghorbani, A.A. Network Anomaly Detection Based on Wavelet Analysis. EURASIP J. Adv. Sig. Proc. 2009, 2009, doi:10.1155/2009/837601.
    • (2009) EURASIP J. Adv. Sig. Proc. , vol.2009
    • Lu, W.1    Ghorbani, A.A.2
  • 38
    • 77956471727 scopus 로고    scopus 로고
    • Presented at 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), Kuching, Sarawak, Malaysia, 15-18 June
    • Limthong, K.; Watanapongse, P.; Kensuke, F. A wavelet-based anomaly detection for outbound network traffic. Presented at 8th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), Kuching, Sarawak, Malaysia, 15-18 June 2010; pp. 1-6.
    • (2010) A wavelet-based anomaly detection for outbound network traffic , pp. 1-6
    • Limthong, K.1    Watanapongse, P.2    Kensuke, F.3
  • 39
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-chain model for cyber-attack detection
    • Ye, N.; Zhang, Y.; Borror, C.M. Robustness of the Markov-chain model for cyber-attack detection. IEEE Trans. Reliab. 2004, 53, 116-123.
    • (2004) IEEE Trans. Reliab. , vol.53 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 41
    • 84930358040 scopus 로고    scopus 로고
    • Unsupervised Clustering Approach for Network Anomaly Detection
    • Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany
    • Syarif, I.; Prugel-Bennett, A.; Wills, G. Unsupervised Clustering Approach for Network Anomaly Detection. In Networked Digital Technologie, Volume 293, Communications in Computer and Information Science; Springer: Berlin/Heidelberg, Germany, 2012; pp 135-145.
    • (2012) Networked Digital Technologie , vol.293 , pp. 135-145
    • Syarif, I.1    Prugel-Bennett, A.2    Wills, G.3
  • 42
    • 84917687883 scopus 로고    scopus 로고
    • Visualize Network Anomaly Detection By Using K-Means Clustering Algorithm
    • Riad, A.; Elhenawy, I.; Hassan, A.; Awadallah, N. Visualize Network Anomaly Detection By Using K-Means Clustering Algorithm. Int. J. Comput. Netw. Commun. 2013, 5, doi:10.5121/ijcnc.2013.5514.
    • (2013) Int. J. Comput. Netw. Commun. , vol.5
    • Riad, A.1    Elhenawy, I.2    Hassan, A.3    Awadallah, N.4
  • 43
    • 84930317380 scopus 로고    scopus 로고
    • Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data
    • Bazan, J.; Szpyrka, M.; Szczur, A.; Dydo, L.; Wojtowicz, H. Classifiers for Behavioral Patterns Identification Induced from Huge Temporal Data. Fundam. Inform. 2015, in press.
    • (2015) Fundam. Inform.
    • Bazan, J.1    Szpyrka, M.2    Szczur, A.3    Dydo, L.4    Wojtowicz, H.5
  • 48
    • 84921751943 scopus 로고    scopus 로고
    • Entropy-Based Characterization of Internet Background Radiation
    • Iglesias, F.; Zseby, T. Entropy-Based Characterization of Internet Background Radiation. Entropy 2014, 17, 74-101.
    • (2014) Entropy , vol.17 , pp. 74-101
    • Iglesias, F.1    Zseby, T.2
  • 49
    • 0242341156 scopus 로고    scopus 로고
    • An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks
    • Available online, accessed on 16 April 2015
    • Harrington, D.; Presuhn, R.; Wijnen, B. An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. Available online: http://www.ietf. org/rfc/rfc3411.txt (accessed on 16 April 2015).
    • Harrington, D.1    Presuhn, R.2    Wijnen, B.3
  • 52
    • 84870360312 scopus 로고    scopus 로고
    • Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid
    • Choi, K.; Chen, X.; Li, S.; Kim, M.; Chae, K.; Na, J. Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid. Energies 2012, 5, 4091-4109.
    • (2012) Energies , vol.5 , pp. 4091-4109
    • Choi, K.1    Chen, X.2    Li, S.3    Kim, M.4    Chae, K.5    Na, J.6
  • 53
    • 74349126900 scopus 로고    scopus 로고
    • Fair incentive mechanism with pyramidal structure for peer-to-peer networks
    • Liu, Y.; Xiong, N.; Park, J.; Yang, C.; Xu, K. Fair incentive mechanism with pyramidal structure for peer-to-peer networks. IET Commun. 2010, 4, 1-12.
    • (2010) IET Commun. , vol.4 , pp. 1-12
    • Liu, Y.1    Xiong, N.2    Park, J.3    Yang, C.4    Xu, K.5
  • 55
    • 70350627700 scopus 로고    scopus 로고
    • Volume Anomaly Detection in Data Networks:An Optimal Detection Algorithm vs. the PCA Approach
    • Valadas, R., Salvador, P., Eds, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
    • Casas, P.; Fillatre, L.; Vaton, S.; Nikiforov, I. Volume Anomaly Detection in Data Networks:An Optimal Detection Algorithm vs. the PCA Approach. In Traffic Management and Traffic Engineering for the Future Interne, Valadas, R., Salvador, P., Eds.; Volume 5464, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2009; pp 96-113.
    • (2009) Traffic Management and Traffic Engineering for the Future Interne , vol.5464 , pp. 96-113
    • Casas, P.1    Fillatre, L.2    Vaton, S.3    Nikiforov, I.4
  • 56
    • 84930322784 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Plixer Scrutinizer-Incydent Response System. Available online: http://www.plixer.com (accessed on 16 April 2015).
  • 57
    • 84930320122 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Peassler PRTG-Network Monitor. Available online: http://www.paessler.com (accessed on 16 April 2015).
  • 58
    • 84930341628 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Solarwinds Network Traffic Analyzer. Available online: http://www.solarwinds.com (accessed on 16 April 2015).
  • 59
    • 84930346384 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Invea-Tech FlowMon. Available online: https://www.invea.com (accessed on 16 April 2015).
  • 60
    • 84930364521 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • AKMA Labs FlowMatrix. Available online: http://www.akmalabs.com (accessed on 16 April 2015).
  • 61
    • 84919672677 scopus 로고    scopus 로고
    • ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks
    • Jingle, I.; Rajsingh, E. ColShield: An effective and collaborative protection shield for the detection and prevention of collaborative flooding of DDoS attacks in wireless mesh networks. Human-centric Comput. Inf. Sci. 2014, 4, doi: 10.1186/s13673-014-0008-8.
    • (2014) Human-centric Comput. Inf. Sci. , vol.4
    • Jingle, I.1    Rajsingh, E.2
  • 62
    • 84901410507 scopus 로고    scopus 로고
    • Detection and defense of application-layer {DDoS} attacks in backbone web traffic
    • Zhou, W.; Jia, W.; Wen, S.; Xiang, Y.; Zhou, W. Detection and defense of application-layer {DDoS} attacks in backbone web traffic. Future Gener. Comput. Syst. 2014, 38, 36-46.
    • (2014) Future Gener. Comput. Syst. , vol.38 , pp. 36-46
    • Zhou, W.1    Jia, W.2    Wen, S.3    Xiang, Y.4    Zhou, W.5
  • 64
    • 33847290520 scopus 로고    scopus 로고
    • Mining Anomalies Using Traffic Feature Distributions
    • Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05), Philadelphia, PA, USA, 22-26 August
    • Lakhina, A.; Crovella, M.; Diot, C. Mining Anomalies Using Traffic Feature Distributions. In Proceedings of the 2005 Conference on Application, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'05), Philadelphia, PA, USA, 22-26 August 2005; pp 217-228.
    • (2005) Proceedings of the 2005 Conference on Application , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 65
    • 84940644968 scopus 로고
    • A Mathematical Theory of Communication
    • Shannon, C. A Mathematical Theory of Communication. Bell Syst. Tech. J. 1948, 27, 379-423.
    • (1948) Bell Syst. Tech. J. , vol.27 , pp. 379-423
    • Shannon, C.1
  • 66
    • 82555177371 scopus 로고    scopus 로고
    • A Characterization of Entropy in Terms of Information Loss
    • Baez, J.C.; Fritz, T.; Leinster, T. A Characterization of Entropy in Terms of Information Loss. Entropy 2011, 13, 1945-1957.
    • (2011) Entropy , vol.13 , pp. 1945-1957
    • Baez, J.C.1    Fritz, T.2    Leinster, T.3
  • 67
  • 72
    • 50449088248 scopus 로고    scopus 로고
    • Detecting network events via T-entropy
    • Communications Signal Processing, Singapore, Singapore, 10-13 December 2007
    • Speidel, U.; Eimann, R.; Brownlee, N. Detecting network events via T-entropy. In Proceedings of 6th International Conference on Informatio, Communications Signal Processing, Singapore, Singapore, 10-13 December 2007 , 2007; pp 1-5.
    • (2007) Proceedings of 6th International Conference on Informatio , pp. 1-5
    • Speidel, U.1    Eimann, R.2    Brownlee, N.3
  • 76
    • 33646516485 scopus 로고
    • Possible generalization of Boltzmann-Gibbs statistics
    • Tsallis, C. Possible generalization of Boltzmann-Gibbs statistics. J. Stat. Phys. 1988, 52, 479-487.
    • (1988) J. Stat. Phys. , vol.52 , pp. 479-487
    • Tsallis, C.1
  • 77
    • 82655173397 scopus 로고    scopus 로고
    • The Nonadditive Entropy Sq and Its Applications in Physics and Elsewhere: Some Remarks
    • Tsallis, C. The Nonadditive Entropy Sq and Its Applications in Physics and Elsewhere: Some Remarks. Entropy 2011, 13, 1765-1804.
    • (2011) Entropy , vol.13 , pp. 1765-1804
    • Tsallis, C.1
  • 78
    • 84860673981 scopus 로고    scopus 로고
    • Tsallis Relative Entropy and Anomalous Diffusion
    • Prehl, J.; Essex, C.; Hoffmann, K.H. Tsallis Relative Entropy and Anomalous Diffusion. Entropy 2012, 14, 701-716.
    • (2012) Entropy , vol.14 , pp. 701-716
    • Prehl, J.1    Essex, C.2    Hoffmann, K.H.3
  • 80
    • 54749100076 scopus 로고    scopus 로고
    • Axiomatic Characterizations of Information Measures
    • Csiszár, I. Axiomatic Characterizations of Information Measures. Entropy 2008, 10, 261-273.
    • (2008) Entropy , vol.10 , pp. 261-273
    • Csiszár, I.1
  • 88
    • 0001549935 scopus 로고    scopus 로고
    • Maximum Entropy Fundamentals
    • Harremoes, P.; Topsoe, F. Maximum Entropy Fundamentals. Entropy 2001, 3, 191-226.
    • (2001) Entropy , vol.3 , pp. 191-226
    • Harremoes, P.1    Topsoe, F.2
  • 91
    • 48249143738 scopus 로고    scopus 로고
    • Comparison of Shannon, Renyi and Tsallis Entropy Used in Decision Trees
    • Rutkowski, L., Tadeusiewicz, R., Zadeh, L., Zurada, J., Eds.;, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
    • Maszczyk, T.; Duch, W. Comparison of Shannon, Renyi and Tsallis Entropy Used in Decision Trees. In Artificial Intelligence and Soft Computing-ICAISC 200, Rutkowski, L., Tadeusiewicz, R., Zadeh, L., Zurada, J., Eds.; Volume 5097, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2008; pp 643-651.
    • (2008) Artificial Intelligence and Soft Computing-ICAISC 200 , vol.5097 , pp. 643-651
    • Maszczyk, T.1    Duch, W.2
  • 92
    • 16844386674 scopus 로고    scopus 로고
    • A step beyond Tsallis and Rényi entropies
    • Marco, M. A step beyond Tsallis and Rényi entropies. Phys. Lett. A 2005, 338, 217-224.
    • (2005) Phys. Lett. A , vol.338 , pp. 217-224
    • Marco, M.1
  • 94
    • 84930356580 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Softflowd-Flow-based Network Traffic Analyser. Available online: http://code.google.com/p/ softflowd/(accessed on 16 April 2015).
  • 95
    • 84930364647 scopus 로고    scopus 로고
    • White Paper. Available online, accessed on 16 April 2015
    • Gigamon-SPAN Port Or TAP? White Paper. Available online: https://www.netdescribe.com/ downloads/span_port_or_tap_web.pdf (accessed on 16 April 2015).
  • 97
    • 18144411417 scopus 로고    scopus 로고
    • Background and threshold: critical comparison of methods of determination
    • Reimann, C.; Filzmoser, P.; Garrett, R.G. Background and threshold: critical comparison of methods of determination. Sci. Total Environ. 2005, 346, 1-16.
    • (2005) Sci. Total Environ. , vol.346 , pp. 1-16
    • Reimann, C.1    Filzmoser, P.2    Garrett, R.G.3
  • 98
    • 84885213555 scopus 로고    scopus 로고
    • Telecommunications Networks Risk Assessment with Bayesian Networks
    • Saeed, K., Chaki, R., Cortesi, A.,Wierzchoń, S., Eds., Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
    • Szpyrka, M.; Jasiul, B.; Wrona, K.; Dziedzic, F. Telecommunications Networks Risk Assessment with Bayesian Networks. In Computer Information Systems and Industrial Managemen, Saeed, K., Chaki, R., Cortesi, A.,Wierzchoń, S., Eds.; Volume 8104, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2013; pp 277-288.
    • (2013) Computer Information Systems and Industrial Managemen , vol.8104 , pp. 277-288
    • Szpyrka, M.1    Jasiul, B.2    Wrona, K.3    Dziedzic, F.4
  • 100
    • 84920889921 scopus 로고    scopus 로고
    • Detection and Modeling of Cyber Attacks with Petri Nets
    • Jasiul, B.; Szpyrka, M.; Śliwa, J. Detection and Modeling of Cyber Attacks with Petri Nets. Entropy 2014, 16, 6602-6623.
    • (2014) Entropy , vol.16 , pp. 6602-6623
    • Jasiul, B.1    Szpyrka, M.2    Śliwa, J.3
  • 101
    • 84910603192 scopus 로고    scopus 로고
    • Malware Behavior Modeling with Colored Petri Nets
    • Saeed, K., Snasel, V., Eds.;, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany
    • Jasiul, B.; Szpyrka, M.; Śliwa, J. Malware Behavior Modeling with Colored Petri Nets. In Computer Information Systems and Industrial Managemen, Saeed, K., Snasel, V., Eds.; Volume 8838, Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2014; pp 667-679.
    • (2014) Computer Information Systems and Industrial Managemen , vol.8838 , pp. 667-679
    • Jasiul, B.1    Szpyrka, M.2    Śliwa, J.3
  • 102
    • 84915820213 scopus 로고    scopus 로고
    • Formal Specification of Malware Models in the Form of Colored Petri Nets
    • Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G., Eds.;, Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany
    • Jasiul, B.; Szpyrka, M.; Śliwa, J. Formal Specification of Malware Models in the Form of Colored Petri Nets. In Computer Science and its Application, Park, J.J.J.H., Stojmenovic, I., Jeong, H.Y., Yi, G., Eds.; Volume 330, Lecture Notes in Electrical Engineering; Springer: Berlin/Heidelberg, Germany, 2015; pp 475-482.
    • (2015) Computer Science and its Application , vol.330 , pp. 475-482
    • Jasiul, B.1    Szpyrka, M.2    Śliwa, J.3
  • 103
    • 84930339539 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • ACM Sigcomm Internet Traffic Archive. Available online: http://www.sigcomm.org/ITA (accessed on 16 April 2015).
  • 104
    • 84930353480 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Lawrence Berkeley National Laboratory/International Computer Science Institute Enterprise Tracing. Available online: http://www.icir.org/enterprise-tracing/ (accessed on 16 April 2015).
  • 105
    • 84930317555 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • SimpleWeb. Available online: http://www.simpleweb.org/wiki/Traces (accessed on 16 April 2015).
  • 106
    • 84930334574 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Center for Applied Internet Data Analysis (CAIDA). Available online: http://www.caida.org/ data/overview (accessed on 16 April 2015).
  • 107
    • 84930328270 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Cluster of European Projects aimed at Monitoring and Measurement (MoMe). Available online:http://www.ist-mome.org/database/MeasurementData (accessed on 16 April 2015).
  • 108
    • 84930330751 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Waikato Internet Traffic Storage (WITS). Available online: http://wand.net.nz/wits (accessed on 16 April 2015).
  • 109
    • 84930320032 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • UMass Trace Repository (UMass). Available online: http://traces.cs.umass.edu (accessed on 16 April 2015).
  • 110
    • 84930341737 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Verizon Data Breach Investigations Report. Available online: http://www.verizonenterprise.com/ DBIR/2014/(accessed on 16 April 2015).
  • 111
    • 84930368413 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Symantec Internet Security Threat Report. Available online: http://www.symantec.com/security_ response/publications/threatreport.jsp (accessed on 16 April 2015).
  • 112
    • 84930354194 scopus 로고    scopus 로고
    • Availableonline:, accessed on 16 April 2015
    • CERT Poland Raport. Availableonline:http://www.cert.pl/PDF/Report_CP_2013.pdf (accessed on 16 April 2015).
  • 114
    • 84903157026 scopus 로고    scopus 로고
    • An Empirical Comparison of Botnet Detection Methods
    • García, S.; Grill, M.; Stiborek, J.; Zunino, A. An Empirical Comparison of Botnet Detection Methods. Comput. Secur. 2014, 45, 100-123.
    • (2014) Comput. Secur. , vol.45 , pp. 100-123
    • García, S.1    Grill, M.2    Stiborek, J.3    Zunino, A.4
  • 118
    • 84930327267 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • The Third International Knowledge Discovery and Data Mining Tools (KDD) Cup 1999 Data. Available online: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed on 16 April 2015).
    • Cup 1999 Data
  • 120
    • 85019691440 scopus 로고    scopus 로고
    • Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations As Performed by Lincoln Laboratory
    • McHugh, J. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations As Performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. 2000, 3, 262-294.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , pp. 262-294
    • McHugh, J.1
  • 121
    • 35248857893 scopus 로고    scopus 로고
    • An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
    • Vigna, G.; Kruegel, C., Jonsson, E., Eds, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany
    • Mahoney, M.V.; Chan, P.K. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In Recent Advances in Intrusion Detectio, Vigna, G.; Kruegel, C., Jonsson, E., Eds.; Volume 2820, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany, 2003; pp 220-237.
    • (2003) Recent Advances in Intrusion Detectio , vol.2820 , pp. 220-237
    • Mahoney, M.V.1    Chan, P.K.2
  • 122
    • 43249094048 scopus 로고    scopus 로고
    • Usefulness of DARPA dataset for intrusion detection system evaluation
    • Thomas, C.; Sharma, V.; Balakrishnan, N. Usefulness of DARPA dataset for intrusion detection system evaluation. SPIE Proc. 2008, doi:10.1117/12.777341.
    • (2008) SPIE Proc.
    • Thomas, C.1    Sharma, V.2    Balakrishnan, N.3
  • 125
    • 84859430323 scopus 로고    scopus 로고
    • Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection
    • Shiravi, A.; Shiravi, H.; Tavallaee, M.; Ghorbani, A.A. Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection. Comput. Secur. 2012, 31, 357-374.
    • (2012) Comput. Secur. , vol.31 , pp. 357-374
    • Shiravi, A.1    Shiravi, H.2    Tavallaee, M.3    Ghorbani, A.A.4
  • 126
    • 84910631483 scopus 로고    scopus 로고
    • Network Anomaly Detection Using Parameterized Entropy
    • Saeed, K., Snasel, V., Eds.;, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany
    • Bereziński, P.; Szpyrka, M.; Jasiul, B.; Mazur, M. Network Anomaly Detection Using Parameterized Entropy. In Computer Information Systems and Industrial Managemen, Saeed, K., Snasel, V., Eds.; Volume 8838, Lecture Notes in Computer Science; Springer:Berlin/Heidelberg, Germany, 2014; pp 465-478.
    • (2014) Computer Information Systems and Industrial Managemen , vol.8838 , pp. 465-478
    • Bereziński, P.1    Szpyrka, M.2    Jasiul, B.3    Mazur, M.4
  • 127
    • 84930352083 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Tomer, B. Morto Post Mortem: Dissecting a Worm; Available online: http://blog.imperva.com/2011/09/morto-post-mortem-a-worm-deep-dive.html (accessed on 16 April 2015).
    • Morto Post Mortem: Dissecting a Worm
    • Tomer, B.1
  • 132
    • 79959852979 scopus 로고    scopus 로고
    • Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data
    • Hauke, J.; Kossowski, T. Comparison of Values of Pearson's and Spearman's Correlation Coefficients on the Same Sets of Data. Quaest. Geogr. 2011, 30, 87-93.
    • (2011) Quaest. Geogr. , vol.30 , pp. 87-93
    • Hauke, J.1    Kossowski, T.2
  • 134
    • 84895868005 scopus 로고    scopus 로고
    • Classification of Knee Joint Vibration Signals Using Bivariate Feature Distribution Estimation and Maximal Posterior Probability Decision Criterion
    • Wu, Y.; Cai, S.; Yang, S.; Zheng, F.; Xiang, N. Classification of Knee Joint Vibration Signals Using Bivariate Feature Distribution Estimation and Maximal Posterior Probability Decision Criterion. Entropy 2013, 15, 1375-1387.
    • (2013) Entropy , vol.15 , pp. 1375-1387
    • Wu, Y.1    Cai, S.2    Yang, S.3    Zheng, F.4    Xiang, N.5
  • 135
    • 84930339737 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • Rifkin, R. MIT-Multiclass Classification. Available online: http://www.mit.edu/~9.520/ spring09/Classes/multiclass.pdf (accessed on 16 April 2015).
    • MIT-Multiclass Classification
    • Rifkin, R.1
  • 137
    • 0003737234 scopus 로고    scopus 로고
    • Wiley Series in Probability and Statistics; Wiley:Hoboken, NJ, USA
    • Seber, G.; Lee, A. Linear Regression Analysis; Wiley Series in Probability and Statistics; Wiley:Hoboken, NJ, USA, 2012.
    • (2012) Linear Regression Analysis
    • Seber, G.1    Lee, A.2
  • 139
    • 84861617363 scopus 로고    scopus 로고
    • An Extensive Experimental Comparison of Methods for Multi-label Learning
    • Madjarov, G.; Kocev, D.; Gjorgjevikj, D.; Deroski, S. An Extensive Experimental Comparison of Methods for Multi-label Learning. Pattern Recogn. 2012, 45, 3084-3104.
    • (2012) Pattern Recogn. , vol.45 , pp. 3084-3104
    • Madjarov, G.1    Kocev, D.2    Gjorgjevikj, D.3    Deroski, S.4
  • 140
    • 84930323816 scopus 로고    scopus 로고
    • Available online, accessed on 16 April 2015
    • MEKA: A Multi-label Extension to WEKA. Available online: http://meka.sourceforge.net/ (accessed on 16 April 2015).
    • A Multi-label Extension to WEKA


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.