an unsupervised distributed intrusion detection system with effective bandwidth utilization

Publish Year: 1389
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,653

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ISCC07_014

تاریخ نمایه سازی: 11 آذر 1389

Abstract:

the growing number of network attacks has become a serious threat for computers and networks worldwide. Conventional intrusion detection techniques are ineffective inmost complex, and specially distributed attacks. In this paper a new approach to build a global model in distributed intrusiondetection , while managing bandwidth limitations has been proposed . in the proposed scheme local attacks are determined using data mining techniques such as clustering methods and outlier detection techniques.

Keywords:

distributed intrusion detection system , IDS , DCT , clustering

Authors

morteza zihayat

school of electrical and computer engineering university of tehran

mahmoudreza hashemi

school of electrical and computer engineering university of tehran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • S. Axelsson, "Intrusion Detection Systems: A Survey and Taxonomy, " ...
  • N. Einwechter, _ Introduction o Distributed Intrusion Detection Systems", Security ...
  • Y.F.Zhang, Z.Y. Xiong and X.Q.Wang. "Distributed Intrusion Detection based on ...
  • L. Portnoy, E. Eskin, S. Stolfo. "Intrusion detection with _ ...
  • S. Rawat and , S. Sastry, "Network Intrusion Detection ...
  • _ _ _ Method Based on Wavelet Neural Network", Second ...
  • Wei Lu and Ali A Ghorbani, "Network Anomaly Detection _ ...
  • S. S. Kim and A. L. N. Reddy. "Image-Based Anomaly ...
  • A. Abraham, R. Jain, J. Thomas, and S. Han, "D-SCIDS: ...
  • _ ISCISC, September 15-16, 2010. K.N.Toosi University Of Technoligy ...
  • S. Janakiraman and V. Vasudevan, "An Intelligent Distributed ...
  • J. Cao and G. Zheng, "Research on distributed intrusion ...
  • K. Lee, J. Kim, K. Kwon, Y. Han, and S. ...
  • H.V. Nguyen, V. Gopalkrishnan, and P. Namburi, "Online Outlier Detection ...
  • _ _ _ _ _ accessed on May 2010. ...
  • H. Gines Kayack, A. Nur Zincir-Heywo od, Malcolm I. Heywood, ...
  • Y. Zhao and G. Karypis. "Criterion functions for document ...
  • _ _ _ _ applications using text mining, " Engineering ...
  • نمایش کامل مراجع