메뉴 건너뛰기




Volumn 24, Issue 5, 2016, Pages 3162-3176

A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior

Author keywords

Behavior modeling; collaborative defense; distributed detection; network security

Indexed keywords

COMPUTER AIDED DESIGN; DISTRIBUTED COMPUTER SYSTEMS; IMAGE SEGMENTATION; MARKOV PROCESSES; STOCHASTIC MODELS; STOCHASTIC SYSTEMS;

EID: 84956853933     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2015.2512609     Document Type: Article
Times cited : (13)

References (35)
  • 1
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • R. Mitchell and I.-R. Chen, "A survey of intrusion detection techniques for cyber-physical systems," ACM Comput. Surveys, vol. 46, no. 4, p. 55, 2014.
    • (2014) ACM Comput. Surveys , vol.46 , Issue.4 , pp. 55
    • Mitchell, R.1    Chen, I.-R.2
  • 2
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
    • Apr.
    • S. Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Commun. Surveys Tuts., vol. 15, no. 4, pp. 2046-2069, Apr. 2013.
    • (2013) IEEE Commun. Surveys Tuts. , vol.15 , Issue.4 , pp. 2046-2069
    • Zargar, S.1    Joshi, J.2    Tipper, D.3
  • 3
    • 0002473030 scopus 로고
    • Dids (distributed intrusion detection system)-motivation, architecture, and an early prototype
    • S. R. Snapp et al., "Dids (distributed intrusion detection system)-motivation, architecture, and an early prototype," in Proc. 14th Nat. Comput. Security Conf., 1991, vol. 1, pp. 167-176.
    • (1991) Proc. 14th Nat. Comput. Security Conf. , vol.1 , pp. 167-176
    • Snapp, S.R.1
  • 4
    • 71749107086 scopus 로고    scopus 로고
    • A survey of coordinated attacks and collaborative intrusion detection
    • C. V. Zhou, C. Leckie, and S. Karunasekera, "A survey of coordinated attacks and collaborative intrusion detection," Comput. Security, vol. 29, no. 1, pp. 124-140, 2010.
    • (2010) Comput. Security , vol.29 , Issue.1 , pp. 124-140
    • Zhou, C.V.1    Leckie, C.2    Karunasekera, S.3
  • 5
    • 78149465725 scopus 로고    scopus 로고
    • Architectures for the future networks and the next generation Internet: A survey
    • S. Paul, J. Pan, and R. Jain, "Architectures for the future networks and the next generation Internet: A survey," Comput. Commun., vol. 34, no. 1, pp. 2-42, 2011.
    • (2011) Comput. Commun. , vol.34 , Issue.1 , pp. 2-42
    • Paul, S.1    Pan, J.2    Jain, R.3
  • 6
    • 85028098285 scopus 로고    scopus 로고
    • Parametric methods for anomaly detection in aggregate traffic
    • Apr.
    • G. Thatte, U. Mitra, and J. Heidemann, "Parametric methods for anomaly detection in aggregate traffic," IEEE/ACM Trans. Netw., vol. 19, no. 2, pp. 512-525, Apr. 2011.
    • (2011) IEEE/ACM Trans. Netw. , vol.19 , Issue.2 , pp. 512-525
    • Thatte, G.1    Mitra, U.2    Heidemann, J.3
  • 7
    • 84860544941 scopus 로고    scopus 로고
    • Firecol: A collaborative protection network for the detection of flooding DDoS attacks
    • Dec.
    • J. François, I. Aib, and R. Boutaba, "Firecol: A collaborative protection network for the detection of flooding DDoS attacks," IEEE/ACM Trans. Netw., vol. 20, no. 6, pp. 1828-1841, Dec. 2012.
    • (2012) IEEE/ACM Trans. Netw. , vol.20 , Issue.6 , pp. 1828-1841
    • François, J.1    Aib, I.2    Boutaba, R.3
  • 8
    • 84655161362 scopus 로고    scopus 로고
    • Collaborative anomaly-based detection of large-scale Internet attacks
    • T. Gamer, "Collaborative anomaly-based detection of large-scale Internet attacks," Comput. Netw., vol. 56, no. 1, pp. 169-185, 2012.
    • (2012) Comput. Netw. , vol.56 , Issue.1 , pp. 169-185
    • Gamer, T.1
  • 9
    • 84864984635 scopus 로고    scopus 로고
    • Collaborative detection of traffic anomalies using first order Markov chains
    • D. Dudek, "Collaborative detection of traffic anomalies using first order Markov chains," in Proc. 9th IEEE Int. Conf. Netw. Sensing Syst., 2012, pp. 1-4.
    • (2012) Proc. 9th IEEE Int. Conf. Netw. Sensing Syst. , pp. 1-4
    • Dudek, D.1
  • 11
    • 84893403269 scopus 로고    scopus 로고
    • CoDef: Collaborative defense against large-scale link-flooding attacks
    • S. B. Lee, M. S. Kang, and V. D. Gligor, "CoDef: Collaborative defense against large-scale link-flooding attacks," in Proc. CoNEXT, 2013, pp. 417-428.
    • (2013) Proc. CoNEXT , pp. 417-428
    • Lee, S.B.1    Kang, M.S.2    Gligor, V.D.3
  • 12
    • 84863381941 scopus 로고    scopus 로고
    • Detecting anomalous insiders in collaborative information systems
    • May-Jun.
    • Y. Chen, S. Nyemba, and B. Malin, "Detecting anomalous insiders in collaborative information systems," IEEE Trans. Depend. Secure Comput., vol. 9, no. 3, pp. 332-344, May-Jun. 2012.
    • (2012) IEEE Trans. Depend. Secure Comput. , vol.9 , Issue.3 , pp. 332-344
    • Chen, Y.1    Nyemba, S.2    Malin, B.3
  • 13
    • 84857574309 scopus 로고    scopus 로고
    • Dcdidp: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments
    • S. T. Zargar, H. Takabi, and J. B. Joshi, "Dcdidp: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments," in Proc. 7th IEEE Int. Conf. Collab. Comput., Netw., Appl. Worksharing, 2011, pp. 332-341.
    • (2011) Proc. 7th IEEE Int. Conf. Collab. Comput., Netw., Appl. Worksharing , pp. 332-341
    • Zargar, S.T.1    Takabi, H.2    Joshi, J.B.3
  • 15
    • 34547936756 scopus 로고    scopus 로고
    • A proactive malware identification system based on the computer hygiene principles
    • V. Vlachos and D. Spinellis, "A proactive malware identification system based on the computer hygiene principles," Inf. Manage. Comput. Security, vol. 15, no. 4, pp. 295-312, 2007.
    • (2007) Inf. Manage. Comput. Security , vol.15 , Issue.4 , pp. 295-312
    • Vlachos, V.1    Spinellis, D.2
  • 17
    • 85137546697 scopus 로고    scopus 로고
    • Global intrusion detection in the domino overlay system
    • V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the domino overlay system," in Proc. NDSS, 2004.
    • (2004) Proc. NDSS
    • Yegneswaran, V.1    Barford, P.2    Jha, S.3
  • 18
    • 44849134557 scopus 로고    scopus 로고
    • A global security architecture for intrusion detection on computer networks
    • A. Karim Ganame, J. R. Bourgeois, R. Bidou, and F. Spies, "A global security architecture for intrusion detection on computer networks," Comput. Security, vol. 27, no. 1, pp. 30-47, 2008.
    • (2008) Comput. Security , vol.27 , Issue.1 , pp. 30-47
    • Karim Ganame, A.1    Bourgeois, J.R.2    Bidou, R.3    Spies, F.4
  • 19
    • 49949084678 scopus 로고    scopus 로고
    • Multi-agent reinforcement learning for intrusion detection
    • New York, NY, USA: Springer
    • A. Servin and D. Kudenko, "Multi-agent reinforcement learning for intrusion detection," in Lecture Notes in Computer Science. New York, NY, USA: Springer, 2008, vol. 4865, pp. 211-223.
    • (2008) Lecture Notes in Computer Science , vol.4865 , pp. 211-223
    • Servin, A.1    Kudenko, D.2
  • 22
    • 79957530146 scopus 로고    scopus 로고
    • Low-rate DDoS attacks detection and traceback by using new information metrics
    • Jun.
    • Y. Xiang, K. Li, and W. Zhou, "Low-rate DDoS attacks detection and traceback by using new information metrics," IEEE Trans. Inf. Forensics Security, vol. 6, no. 2, pp. 426-437, Jun. 2011.
    • (2011) IEEE Trans. Inf. Forensics Security , vol.6 , Issue.2 , pp. 426-437
    • Xiang, Y.1    Li, K.2    Zhou, W.3
  • 23
    • 84865446336 scopus 로고    scopus 로고
    • Enhancing collaborative intrusion detection methods using a Kademlia overlay network
    • New York, NY, USA: Springer
    • Z. Czirkos and G. Hosszú, "Enhancing collaborative intrusion detection methods using a Kademlia overlay network," in Information and Communication Technologies. New York, NY, USA: Springer, 2012, pp. 52-63.
    • (2012) Information and Communication Technologies , pp. 52-63
    • Czirkos, Z.1    Hosszú, G.2
  • 24
    • 77249132188 scopus 로고    scopus 로고
    • A survey of network virtualization
    • N. Chowdhury and R. Boutaba, "A survey of network virtualization," Comput. Netw., vol. 54, no. 5, pp. 862-876, 2010.
    • (2010) Comput. Netw. , vol.54 , Issue.5 , pp. 862-876
    • Chowdhury, N.1    Boutaba, R.2
  • 26
    • 84872169450 scopus 로고    scopus 로고
    • Network virtualization: Technologies, perspectives, and frontiers
    • Feb.
    • A. Wang, M. Iyer, R. Dutta, G. N. Rouskas, and I. Baldine, "Network virtualization: Technologies, perspectives, and frontiers," J. Lightw. Technol., vol. 31, no. 4, pp. 523-537, Feb. 2013.
    • (2013) J. Lightw. Technol. , vol.31 , Issue.4 , pp. 523-537
    • Wang, A.1    Iyer, M.2    Dutta, R.3    Rouskas, G.N.4    Baldine, I.5
  • 27
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 30
    • 84875930318 scopus 로고    scopus 로고
    • 9th ed. Boston, MA, USA: Brooks/Cole Cengage Learning
    • R. L. Burden and J. D. Faires, Numerical Analysis, 9th ed. Boston, MA, USA: Brooks/Cole Cengage Learning, 2011.
    • (2011) Numerical Analysis
    • Burden, R.L.1    Faires, J.D.2
  • 35
    • 16244366026 scopus 로고
    • Index for rating diagnostic tests
    • W. J. Youden, "Index for rating diagnostic tests," Cancer, vol. 3, no. 1, pp. 32-35, 1950.
    • (1950) Cancer , vol.3 , Issue.1 , pp. 32-35
    • Youden, W.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.