Web-based monitoring approach for network-based intrusion detection and prevention

Naruemon Wattanapongsakorn1, Chalermpol Charnsripinyo2
1Department of Computer Engineering, King Mongkut’s University of Technology Thonburi, Bangkok, Thailand
2National Electronics and Computer Technology Center, Pathumthani, Thailand

Tóm tắt

Từ khóa


Tài liệu tham khảo

Amini M, Jalili A, Shahriari HR (2005) RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput Secur 25:459–468

Bard H (2005) Code Red II analysis. Global Information Assurance Certificated (GIAC) paper, SANS Institute

Ferrie P, Perriot F (2004) Virus analysis 2 mostly harmless. Virus Bulletin, August, 5–8

Fries TP (2008) A fuzzy-genetic approach to network intrusion detection. The 10th Annual Conference on Genetic and Evolutionary Computation (GECCO), 2141–2146

Gómez J, León E (2006) A fuzzy set/rule distance for evolving fuzzy anomaly detectors. IEEE International Conference on Fuzzy Systems, 2286–2292

Hoogstraten JV (2003) Blasting windows: an analysis of the W32/Blaster worm. CGIH Practical Assignment Version 2.1a, SANS Institute

Iptables, The netfilter “iptable” project [online]. Available: http://www.netfilter.org/projects/iptables/index.html

Jongsuebsook P, Wattanapongsakorn N, Charnsripinyo C (2013) Real-time intrusion detection with fuzzy genetic algorithm. ECTI-CON IEEE Conference

Jpcap, a network packet capture library. [Online]. Available: http://www.jpcap.sourceforge.net/

Levy E, Arce I (2004) The spread of the Witty worm. IEEE Secur Priv 2:46–50

Li P, Salour M, Su X (2008) A survey of internet worm detection and containment. IEEE Communication Survey & Tutorials, 1st Quarter, 20–35

McDowell M, US-CERT, Denial of Service Attacks or DoS. [Online]. Available: http://www.thaicert.nectec.or.th/paper/DoS/DoS.php

Port scan techniques. [Online]. Available: http://nmap.org/book/man-port-scanning-techniques.html

Puttini RS, Marrakchi Z, Me L (2003) A Bayesian classification model for real-time intrusion detection. API Conference, 150–162

Sangkatsanee P, Charnsripinyo C, Wattanapongsakorn N (2011) Practical real-time intrusion detection using machine learning approaches. Elsevier Comput Commun 34(18):2227–2235

Sarnsuwan N, Charnsripinyo C, Wattanapongsakorn N (2010) A new approach for internet worm detection and classification, networked computing (INC). 2010 6th International Conference, 1–4

Snort [Online]. Available: http://www.snort.org/Cisco Intrusion Prevention System [Online]. Available: http://www.cisco.com/en/US/products/ps5729/Products_Sub_Category_Home.html

Unix/Linux: Netstat Command example. [Online]. Available: http://www.thegeekstuff.com/2010/03/netstat-command-examples/

Wattanapongsakorn N et al (2012) A practical network-based intrusion detection and prevention system. The 11th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications (TrustCom), 209–214

Weka library, Data Mining Software in Java. [Online]. Available: http://www.cs.waikato.ac.nz/ml/weka/