Traffic Flooding Attack Detection on SNMP MIB Using SVM |
Yu, Jae-Hak
(고려대학교 전산학과)
Park, Jun-Sang (고려대학교 컴퓨터정보학과) Lee, Han-Sung (고려대학교 전산학과) Kim, Myung-Sup (고려대학교 컴퓨터정보학과) Park, Dai-Hee (고려대학교 컴퓨터정보학과) |
1 | 이한성, 송지영, 김은영, 이철호, 박대희, “다중 클래스 SVM기반의 침입탐지 시스템,” 퍼지 및 지능시스템학회 논문지, 제 15권, 제 3 호, pp.282-288, 2005 과학기술학회마을 DOI |
2 | E. Duarte and Jr., A. L. Santos, “Network fault management based on SNMP agent groups”, Proc. of ICDCSW 2001, pp.51-56, 2001 DOI |
3 | L. P. Gaspary, R. N. Sanchez, D. W. Antunes, and E. Meneghetti, “A SNMP-based platform for distributed stateful intrusion detection in enterprise networks”, IEEE Journal on Selected Areas in Communications, Vol. 23, No. 10, pp.1973-1982, 2005 DOI ScienceOn |
4 | J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutierrez, W. Lee, and R. K. Mehra, “Proactive intrusion detection and SNMP-based security management: new experiments and validation”, IFIP/IEEE Eighth International Symposium on Integrated Network Management, pp.93-96, 2003 |
5 | S. Noel, D. Wijesekera, and C. Youman, “Modern intrusion detection, data mining, and degrees of attack guilt”, in Applications of Data Mining in Computer Security, Kluwer Academic Publisher, pp.1-31, 2002 |
6 | R. Puttini, M. Hanashiro, F. Miziara, R. Sousa, L. García-Villalba, and C. Barenco, “On the anomaly intrusion-detection in mobile adhoc network environments”, Proc. of PWC 2006, LNCS 4217, pp.182-193, 2006 DOI ScienceOn |
7 | M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, “A novel anomaly detection scheme based on principal component classifier,” Proc. of the IEEE Foundations and New Directions of Data Mining Workshop, pp.172-179, Melbourne, Florida, USA, 2003 |
8 | D. Yoo, and C. Oh, “Traffic gathering and analysis algorithm for attack detection”, KoCon 2004 Spring Integrated Conference, Vol. 4, pp.33-43, 2004 |
9 | 박준상, 조현승, 김명섭, “SNMP MIB의 상관 관계를 이용한 트래픽 폭주 공격 탐지”, 통신 학회 추계종합학술발표회, 서울대학교, 서울, Nov. 17, pp.13-16, 2007 |
10 | IETF RFC 1213, “Management Information Base for Network Management of TCP/Ip-Based Internets: MIB-II”, http://www.rfc-editor.org/rfc/rfc1213.txt |
11 | K. Ramah, H. Ayari, and F. Kamoun, “Traffic anomaly detection and characterization in the Tunisian national university network”, Proc. of Networking 2006, LNCS 3979, pp.136-147, 2006 DOI ScienceOn |
12 | M. Kim, H. Kang, S. Hong, Seung-Hwa Chung, and J. W. Hong, “A flow-based method for abnormal network traffic detection”, Proc. of NOMS 2004, Seoul, Korea, Apr. 19-23, pp.559-612, 2004 DOI |
13 | H. Lee, J. Song, and D. Park, “Intrusion detection system based on multi-class SVM”, RSFDGrC 2005, LNAI, Vol. 3642, pp.511-519, 2005 DOI ScienceOn |
14 | “Distributed Denial of Service (DDoS) Attacks/tools”, http://staff.washington.edu/dittrich/misc/ddos/ |
15 | J. Li and C. Manikopoulos, “Early statistical anomaly intrusion detection of DOS attacks using MIB traffic parameters”, Information Assurance Workshop, IEEE, pp.53-59, 2003 DOI |
16 | T. Ambwani, “Multi class support vector machine implementation to intrusion detection”, Proceedings of the International Joint Conference on Neural Networks, Vol. 3, pp.2300-2305, 2003 DOI |