Detection of Personal Information Leakage using the Network Traffic Characteristics |
Park, Jung-Min
(이화여자대학교 컴퓨터정보통신공학과)
Kim, Eun-Kyung (이화여자대학교 컴퓨터정보통신공학과) Jung, Yu-Kyung (이화여자대학교 컴퓨터정보통신공학과) Chae, Ki-Joon (이화여자대학교 컴퓨터정보통신공학과) Na, Jung-Chan (한국전자통신연구원 능동보안기술연구팀) |
1 | R. Kalden and S. Ibrahim, 'Searching for Self-similarity in GPRS,' LNCS Vol. 3015, pp. 83-92, 2004 DOI |
2 | Susan C. Lee, David V. Heinbuch, 'Training a Neural-Network Based Intrusion Detector to Recognize Novel Attacks,' IEEE Trans. on Systems, Man and Cybernetics, Vol. 31, No.4, pp.294-299, 2001 DOI ScienceOn |
3 | W. Leland, W. Willinger, M. Taqqu and D. Wilson, 'On the Self-similarity nature of Ethernet Traffic (Extended Version),' IEEE/ACM Transactions on Networking, Vol. 2(1), pp. 1-15, 1994 DOI ScienceOn |
4 | V. Paxson and S. Floyd, 'Wide-area traffic: The failure of Poisson modeling,' IEEE-ACM Transactions on Networking, Vol. 3(3), pp.226-244, 1995 DOI ScienceOn |
5 | Y. Xin, B.-X. Fang, X.-C. Yun, and H.-Y. Chen, 'Worm Detection in Large Scale Network by Traffic,' Proc. of the 6th Intl. Conf. on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05), pp.270-273, 2005 DOI |
6 | M. E. Crovella and A. Bestavros, 'Self-similarity in World Wide Web Traffic: Evidence and Possible Causes,' IEEE/ACM Trans. on Networking, Vol. 5(6), pp.835-846, 1997 DOI ScienceOn |
7 | V. Paxson, 'Fast Approximation of Self-similarity Traffic,' Technical Report LBL-36750, Lawrence Berkeley Laboratory, 1995 |
8 | The CERIAS Intrusion Detection Research Group, 'Digging for Worms, Fishing for Answers,' Proc. of 18th Annual Computer Security Applications Conference, 2002 DOI |
9 | Wenke Lee, Salvatore J. Stolfo, 'Data Mining Approaches for Intrusion Detection,' Proc. of the 7th USENIX Security Symposium, pp.79-94, Jan. 1998 |
10 | C & C Instruments Co. Ltd., http://www.cncinst.com/ |
11 | Laura Feinstein, Dan Schnackenberg Ravindra Balupari, Darrell Kindred, 'Statistical Approaches to DDoS Attack Detection and Response,' Proc. of The DARPA Information Survivability Conference and Exposition, 2003 |
12 | A. Popescu, 'Traffic Self-similarity,' Proc. of IEEE Intl, Conf. on Telecommunications, 2001 |
13 | R. Pacheco, J. Cesar and T. R. Deni, 'Performance Analysis of Time-domain Algorithms for Self-similar Traffic,' Proc. of IEEE Intl' Conf. on Electronics, Communications and Computers, 2006 DOI |