메뉴 건너뛰기




Volumn 7, Issue 4, 2010, Pages 244-257

Machine Learning Techniques for Passive Network Inventory

Author keywords

Fingerprinting; inventory management; SVM; syntactic tree

Indexed keywords


EID: 85008065750     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2010.1012.0352     Document Type: Article
Times cited : (18)

References (31)
  • 5
    • 36049030250 scopus 로고    scopus 로고
    • A new intrusion detection system using support vector machines and hierarchical clustering
    • L. Khan, M. Awad, and B. Thuraisingham “A new intrusion detection system using support vector machines and hierarchical clustering,” VLDB J., vol. 16, no. 4, pp. 507–521, 2007.
    • (2007) VLDB J. , vol.16 , Issue.4 , pp. 507-521
    • Khan, L.1    Awad, M.2    Thuraisingham, B.3
  • 7
    • 4043078519 scopus 로고    scopus 로고
    • A decision based one-against-one method for multi-class support vector machine
    • R. Debnath, N. Takahide, and H. Takahashi “A decision based one-against-one method for multi-class support vector machine,” Pattern Anal. Appl., vol. 7, no. 2, pp. 164–175, 2004.
    • (2004) Pattern Anal. Appl. , vol.7 , Issue.2 , pp. 164-175
    • Debnath, R.1    Takahide, N.2    Takahashi, H.3
  • 8
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multiclass support vector machines
    • Mar.
    • C.-W. Hsu and C.-J. Lin “A comparison of methods for multiclass support vector machines,” IEEE Trans. Neural Networks, vol. 13, no. 2, pp. 415–425, Mar. 2002.
    • (2002) IEEE Trans. Neural Networks , vol.13 , Issue.2 , pp. 415-425
    • Hsu, C.-W.1    Lin, C.-J.2
  • 10
    • 84892062680 scopus 로고    scopus 로고
    • A survey of clustering data mining techniques
    • P. Berkhin, “A survey of clustering data mining techniques,” in Grouping Multidimensional Data, 2006, pp. 25–71.
    • (2006) Grouping Multidimensional Data , pp. 25-71
    • Berkhin, P.1
  • 11
    • 0032652570 scopus 로고    scopus 로고
    • Rock: a robust clustering algorithm for categorical attributes
    • Washington, DC
    • “Rock: a robust clustering algorithm for categorical attributes,” in Proc. 15th International Conf. Data Engineering, Washington, DC, 1999, p. 512.
    • (1999) Proc. 15th International Conf. Data Engineering , pp. 512
  • 12
    • 25844444240 scopus 로고    scopus 로고
    • Qrock: a quick version of the rock algorithm for clustering of categorical data
    • M. Dutta, A. K. Mahanta, and A. K. Pujari “Qrock: a quick version of the rock algorithm for clustering of categorical data,” Pattern Recogn. Lett., vol. 26, no. 15, pp. 2364–2373, 2005.
    • (2005) Pattern Recogn. Lett. , vol.26 , Issue.15 , pp. 2364-2373
    • Dutta, M.1    Mahanta, A.K.2    Pujari, A.K.3
  • 14
    • 85008036657 scopus 로고    scopus 로고
    • Augmented BNF for Syntax Specifications: ABNF
    • D. H. Crocker and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” United States, 1997.
    • (1997) United States
    • Crocker, D.H.1    Overell, P.2
  • 15
    • 79952523119 scopus 로고    scopus 로고
    • SIP stack fingerprinting and stack difference attacks
    • H. Scholz, “SIP stack fingerprinting and stack difference attacks,” Black Hat Briefings, 2006.
    • (2006) Black Hat Briefings
    • Scholz, H.1
  • 16
    • 0033931867 scopus 로고    scopus 로고
    • Assessing the accuracy of prediction algorithms for classification: an overview
    • P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, “Assessing the accuracy of prediction algorithms for classification: an overview,” Bioinformatics, vol. 16, no. 5, pp. 412–24, 2000.
    • (2000) Bioinformatics , vol.16 , Issue.5 , pp. 412-424
    • Baldi, P.1    Brunak, S.2    Chauvin, Y.3    Andersen, C.A.4    Nielsen, H.5
  • 18
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions and reversals
    • V. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals,” Soviet Physics Doklady, vol. 10, 1966.
    • (1966) Soviet Physics Doklady , vol.10
    • Levenshtein, V.1
  • 19
    • 85084161026 scopus 로고
    • Probing TCP implementations
    • [Online]. Available: cite-seer.ist.psu.edu/article/comer94probing.html.
    • Douglas Comer and John C. Lin, “Probing TCP implementations,” in USENIX Summer, 1994, pp. 245–255. [Online]. Available: cite-seer.ist.psu.edu/article/comer94probing.html.
    • (1994) USENIX Summer , pp. 245-255
    • Comer, D.1    Lin, J.C.2
  • 24
    • 29244451861 scopus 로고    scopus 로고
    • ACAS: automated construction of application signatures
    • S. Sen, C. Ji, D. Saha, and J. McCloskey, editors
    • P. Haffner, S. Sen, O. Spatscheck, and D. Wang, “ACAS: automated construction of application signatures,” in MineNet, S. Sen, C. Ji, D. Saha, and J. McCloskey, editors, 2005, pp. 197–202.
    • (2005) MineNet , pp. 197-202
    • Haffner, P.1    Sen, S.2    Spatscheck, O.3    Wang, D.4
  • 25
    • 0003415244 scopus 로고    scopus 로고
    • Hypertext Transfer Protocol - HTTP/1.1
    • RFC 2616 (Draft Standard), June, updated by RFC 2817. [Online]. Available: http://www.ietf.org/rfc/rfc2616.txt.
    • R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, “Hypertext Transfer Protocol - HTTP/1.1,” RFC 2616 (Draft Standard), June 1999, updated by RFC 2817. [Online]. Available: http://www.ietf.org/rfc/rfc2616.txt.
    • (1999)
    • Fielding, R.1    Gettys, J.2    Mogul, J.3    Frystyk, H.4    Masinter, L.5    Leach, P.6    Berners-Lee, T.7
  • 30
    • 79951651722 scopus 로고    scopus 로고
    • Machine learning for application-layer intrusion detection
    • Ph.D. dissertation, Fraunhofer Institute FIRST & Berlin Institute of Technology
    • K. Rieck, “Machine learning for application-layer intrusion detection,” Ph.D. dissertation, Fraunhofer Institute FIRST & Berlin Institute of Technology, 2009.
    • (2009)
    • Rieck, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.