An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data |
Chung, Man-Hyun
(Graduate School of Information Management and Security, Korea University)
Cho, Jae-Ik (Graduate School of Information Management and Security, Korea University) Chae, Soo-Young (The Attached Institute of ETRI) Moon, Jong-Sub (Graduate School of Information Management and Security, Korea University) |
1 | Q. Qian and M. Xin, "Research on Hidden Markov for System Call Anomaly Detection," Pacific Asia Workshop on Intelligence and Security Informatics 2007, LNCS 4430, pp.152-159, 2007 |
2 | J. Lemon, "Resisting SYN Flooding Dos Attacks with a SYN Cache," BSDCon 2002, pp. 89-97, Feb. 2002 |
3 | N. Kambhatla and T.K. Leen, "Dimension reduction by local principal component analysis," Neural Computation, vol.9, no.7, pp. 1493-1516, Oct. 1997 DOI ScienceOn |
4 | 양진산, 장병탁, "베이지안 네트워크를 이용한 전자상거래 고객들의 성향 분석," 퍼지 및 지능시스템학회 논문지, 1(1), pp. 16-21, 2001년 1월 |
5 | S. Alok, K.P. Arun, and K.P. Kuldip, "Intrusion detection using text processing techniques with a kernel based similarity measure," Computers & Security, vol. 26, no. 7-8, pp. 488-495, Dec. 2007 DOI ScienceOn |
6 | F. Jensen, An Introduction to Bayesian Networks, Springer-verlag, pp. 201-208, Oct. 1996. |
7 | J.P. Egan, Signal Detection Theory and ROC Analysis, NY Academic Press, p. 157, Dec. 1975 |
8 | T.F. Lunt, "A survey of intrusion detection techniques," Computer & Security, vol. 12, no. 4, pp. 405-418, June 1993 DOI ScienceOn |
9 | ISS, "Network vs Host-based intrusion detection," whitepaper: Oct. 1998 |
10 | P.J.B. Hancock, A.M. Burton, and V. Bruce, "Face Processing: Human perception and principal components analysis," Memory and Cognition, vol. 24, no. 1, pp. 26-40, Aug. 1996 DOI |
11 | N. Friedman and Y. Singer, "Efficient bayesian parameter estimation in large discrete domains," Advances in Neural Information Processing systems, pp. 417-423, Mar. 1998 |
12 | N. Friedman and M. Goldszmidt, "Learning Bayesian networks with local structure," Learning in Graphical Models, Kluwer Acadamic Publishers, pp. 421-459, Mar. 1998 |
13 | R. Oliver, "Countering SYN Flood Denialof-Service Attacks," Invited Talk at The 10th USENIX Security Symposium, p. 2, Aug. 2001 |
14 | D. Heckerman, "A Tutorial on Learning with Bayesian Networks", Technical Report MSRTR- 95-06, Microsoft Research, pp. 339-377, Mar. 1995 |
15 | W. Hu, Y. Liao, and V. Vemuri, "Robust Support Vector Machine for Anomaly Detection in Computer Security," International Conference on Machine Learning, pp. 4-5, June 2003 |
16 | S.H. Paek, Y.K. Oh, J.B. Yun, and D.H. Lee, "The Architecture of Host-based Intrusion Detection Model Generation System for the Frequency Per System Call," International Conference on Hybrid Information Technology 06, vol. 2, no. 2, pp. 277-283, Nov. 2006 |
17 | Y. Liao and V. Vemuri, "Use of K-Nearest Neighbor Classifier for intrusion detection," Computers & Security, vol. 21, no. 5, pp. 439-448, Oct. 2002 DOI ScienceOn |
18 | L. Richard, W.Joshua, Haines, J. David, K. Jonathan, and K. Das, "The 1999 DARPA off-line intrusion detection evaluation," Computer Networks, vol. 34, no. 4, pp.579-595, Aug. 2000 DOI ScienceOn |