Advanced probabilistic approach for network intrusion forecasting and detection

Cited 42 time in webofscience Cited 0 time in scopus
  • Hit : 902
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorShin, Seongjunko
dc.contributor.authorLee, Seungminko
dc.contributor.authorKim, Hyunwooko
dc.contributor.authorKim, Sehunko
dc.date.accessioned2013-03-12T13:36:17Z-
dc.date.available2013-03-12T13:36:17Z-
dc.date.created2012-11-20-
dc.date.created2012-11-20-
dc.date.created2012-11-20-
dc.date.issued2013-01-
dc.identifier.citationEXPERT SYSTEMS WITH APPLICATIONS, v.40, no.1, pp.315 - 322-
dc.identifier.issn0957-4174-
dc.identifier.urihttp://hdl.handle.net/10203/102480-
dc.description.abstractRecently, as damage caused by Internet threats has increased significantly, one of the major challenges is to accurately predict the period and severity of threats. In this study, a novel probabilistic approach is proposed effectively to forecast and detect network intrusions. It uses a Markov chain for probabilistic modeling of abnormal events in network systems. First, to define the network states, we perform K-means clustering, and then we introduce the concept of an outlier factor. Based on the defined states, the degree of abnormality of the incoming data is stochastically measured in real-time. The performance of the proposed approach is evaluated through experiments using the well-known DARPA 2000 data set and further analyzes. The proposed approach achieves high detection performance while representing the level of attacks in stages. In particular, our approach is shown to be very robust to training data sets and the number of states in the Markov model. (C) 2012 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.subjectANOMALY DETECTION-
dc.titleAdvanced probabilistic approach for network intrusion forecasting and detection-
dc.typeArticle-
dc.identifier.wosid000309378200030-
dc.identifier.scopusid2-s2.0-84866102744-
dc.type.rimsART-
dc.citation.volume40-
dc.citation.issue1-
dc.citation.beginningpage315-
dc.citation.endingpage322-
dc.citation.publicationnameEXPERT SYSTEMS WITH APPLICATIONS-
dc.identifier.doi10.1016/j.eswa.2012.07.057-
dc.contributor.localauthorKim, Sehun-
dc.contributor.nonIdAuthorShin, Seongjun-
dc.contributor.nonIdAuthorLee, Seungmin-
dc.contributor.nonIdAuthorKim, Hyunwoo-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorIntrusion forecasting-
dc.subject.keywordAuthorMarkov chain-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorDDoS detection-
dc.subject.keywordAuthorIntrusion forecasting-
dc.subject.keywordAuthorMarkov chain-
dc.subject.keywordAuthorAnomaly detection-
dc.subject.keywordAuthorDDoS detection-
dc.subject.keywordPlusANOMALY DETECTION-
dc.subject.keywordPlusANOMALY DETECTION-
Appears in Collection
IE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 42 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0