A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts

作者: Jungsuk Song , Hiroki Takakura , Yongjin Kwon

DOI: 10.1109/SAINT.2008.85

关键词:

摘要: … honeypots and collected all traffic data to/from the honeypots. We also deployed another SNS7160 IDS system on the same networks as the honeypots… , we classified the testing data as …

参考文章(17)
Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon, A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System Advances in Databases: Concepts, Systems and Applications. pp. 140- 151 ,(2007) , 10.1007/978-3-540-71703-4_14
John C. Platt, Fast training of support vector machines using sequential minimal optimization Advances in kernel methods. pp. 185- 208 ,(1999)
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
E Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, Sal Stolfo, A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA APPLICATIONS OF DATA MINING IN COMPUTER SECURITY. pp. 0- 0 ,(2002) , 10.7916/D8D50TQT
Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon, A comprehensive approach to detect unknown attacks via intrusion detection alerts ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security. pp. 247- 253 ,(2007) , 10.1007/978-3-540-76929-3_23
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation darpa information survivability conference and exposition. ,vol. 2, pp. 12- 26 ,(2000) , 10.1109/DISCEX.2000.821506
Qiang Wang, Vasileios Megalooikonomou, A clustering algorithm for intrusion detection Data mining, intrusion detection, information assurance, and data networks security. Conference. ,vol. 5812, pp. 31- 38 ,(2005) , 10.1117/12.603567
Klaus-Robert Müller, Christin Schäfer, Pavel Laskov, Igor V. Kotenko, Intrusion detection in unlabeled data with quarter-sphere Support Vector Machines Praxis Der Informationsverarbeitung Und Kommunikation. ,vol. 27, pp. 228- 236 ,(2004) , 10.17877/DE290R-15912
Stefanos Manganaris, Marvin Christensen, Dan Zerkle, Keith Hermiz, A data mining analysis of RTID alarms recent advances in intrusion detection. ,vol. 34, pp. 571- 577 ,(2000) , 10.1016/S1389-1286(00)00138-9
Y. Guan, A.A. Ghorbani, N. Belacel, Y-means: a clustering method for intrusion detection canadian conference on electrical and computer engineering. ,vol. 2, pp. 1083- 1086 ,(2003) , 10.1109/CCECE.2003.1226084