Nothing Special   »   [go: up one dir, main page]

Skip to main content

A Self-training Approach for Automatically Labeling IP Traffic Traces

  • Conference paper
Computer Recognition Systems 2

Part of the book series: Advances in Soft Computing ((AINSC,volume 45))

  • 781 Accesses

Abstract

Many approaches have been proposed so far to tackle computer network security. Among them, several systems exploit Pattern Recognition techniques, by regarding malicious behavior detection as a classification problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. C.-C. Chang, C.-J. Lin, LIBSVM: A Library for Support Vector Machines, 2001.

    Google Scholar 

  2. W.W. Cohen, Y. Singer. Simple, Fast, and Effective Rule Learner. In Proceedings of the 16th National Conf. on Artificial Intelligence and 11th Conf. on Innovative Applications of Artificial Intelligence, Orlando (FL), USA, pp. 335–342, July 18–22, 1999.

    Google Scholar 

  3. C. Elkan, Results of the KDD99 classifier learning, ACM SIGKDD Explorations 1, pp. 63–64, 2000.

    Article  Google Scholar 

  4. M. Esposito, C. Mazzariello, F. Oliviero, S. P. Romano, C. Sansone, Real Time Detection of Novel Attack by Means of Data Mining Techniques. In: C.-S. Chen, J. Filipe, I. Seruca, J. Cordeiro (Eds.), Enterprise Information Systems VII, Springer-Verlag, pp. 197–204, 2006.

    Google Scholar 

  5. T. Fawcett, An introduction to ROC analysis, Pattern Recognition Letters vol. 27, pp. 861–874, 2006.

    Article  Google Scholar 

  6. F. Gargiulo, C. Mazzariello, C. Sansone, Information Fusion techniques for reliably Training Intrusion Detection System. In Proc. of IWAPR 2007, Springer Verlag, 2007 (in press).

    Google Scholar 

  7. G. Giacinto, F. Roli, L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, vol. 24, pp. 1795–1803, 2003.

    Article  Google Scholar 

  8. J. Gordon, E.H. Shortliffe, The Dempster-Shafer Theory of Evidence, in B.G. Buchanan and E.H. Shortliffe (Eds.), Rule-Based Expert Systems, Addison-Wesley, pp. 272–292, 1984.

    Google Scholar 

  9. L.I. Kuncheva, Switching Between Selection and Fusion in Combining Classifiers: An Experiment. In IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 32, no. 2, 2002.

    Google Scholar 

  10. L.I. Kuncheva, J.C. Bezdek, R.P.W. Duin, Decision templates for multiple classifier fusion: an experimental comparison. In Pattern Recognition, vol. 34, pp. 299–314. 2001.

    Article  MATH  Google Scholar 

  11. P. Laskov, P. Daussei, C. Schafer, K. Rieck, Learning intrusion detection: supervised or unsupervised?, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 50–57, 2005.

    Google Scholar 

  12. M.V. Mahoney, P.K. Chan, An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, in G. Vigna, E. Jonsson, C. Kruegel (Eds.), LNCS vol. 2820, Proceedings of RAID 2003, pp. 220–238, 2003.

    Google Scholar 

  13. L. Xu, A. Krzyzak, C.Y. Suen, Methods of Combining Multiple Classifiers and Their Applications to Handwriting Recognition. IEEE Trans, on SMC., Vol. 22, pp. 418–435, 1992.

    Google Scholar 

  14. S. Zanero, Analyzing tcp traffic patterns using self organizing maps, in F. Roli and S. Vitulano (Eds.), Lecture Notes in Computer Science, vol. 3617, Springer-Verlag, Berlin, pp. 8390, 2005.

    Google Scholar 

  15. C. Zhang, J. Jiang, M. Kamel, Intrusion detection using hierarchical neural networks. Pattern Recognition Letters 26(6), pp. 779–791, 2005.

    Article  Google Scholar 

  16. X. Zhu, Semi-Supervised Learning Literature Survey, Computer Sciences, University of Wisconsin-Madison 1530, http://www.cs.wisc.edu/~jerryzhu/pub/ssLsurvey.pdf, 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gargiulo, F., Mazzariello, C., Sansone, C. (2007). A Self-training Approach for Automatically Labeling IP Traffic Traces. In: Kurzynski, M., Puchala, E., Wozniak, M., Zolnierek, A. (eds) Computer Recognition Systems 2. Advances in Soft Computing, vol 45. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75175-5_88

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75175-5_88

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75174-8

  • Online ISBN: 978-3-540-75175-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics