Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data

Full metadata record
DC Field Value Language
dc.contributor.authorCho, Jaeik-
dc.contributor.authorLee, Changhoon-
dc.contributor.authorCho, Sanghyun-
dc.contributor.authorSong, Jung Hwan-
dc.contributor.authorLim, Jongin-
dc.contributor.authorMoon, Jongsub-
dc.date.accessioned2021-09-08T04:19:54Z-
dc.date.available2021-09-08T04:19:54Z-
dc.date.created2021-06-11-
dc.date.issued2010-04-
dc.identifier.issn1569-190X-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116765-
dc.description.abstractIn network data analysis, research about how accurate the estimation model represents the universe is inevitable. As the speed of the network increases, so will the attacking methods on future generation communication network. To correspond to these wide variety of attacks, intrusion detection systems and intrusion prevention systems also need a wide variety of counter measures. As a result, an effective method to compare and analyze network data is needed. These methods are needed because when a method to compare and analyze network data is effective, the verification of intrusion detection systems and intrusion prevention systems can be trusted. In this paper, we use extractable standard protocol information of network data to compare and analyze the data of MIT Lincoln Lab with the data of KDD CUP 99 (modeled from Lincoln Lab). Correspondence Analysis and statistical analyzing method is used for comparing data. (C) 2009 Published by Elsevier B.V.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER SCIENCE BV-
dc.subjectCROSS-CLASSIFICATIONS-
dc.subjectORDERED CATEGORIES-
dc.subjectCONTINGENCY-TABLES-
dc.subjectASSOCIATION MODELS-
dc.titleA statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data-
dc.typeArticle-
dc.contributor.affiliatedAuthorLim, Jongin-
dc.contributor.affiliatedAuthorMoon, Jongsub-
dc.identifier.doi10.1016/j.simpat.2009.09.003-
dc.identifier.scopusid2-s2.0-76949102098-
dc.identifier.wosid000276118100004-
dc.identifier.bibliographicCitationSIMULATION MODELLING PRACTICE AND THEORY, v.18, no.4, pp.431 - 435-
dc.relation.isPartOfSIMULATION MODELLING PRACTICE AND THEORY-
dc.citation.titleSIMULATION MODELLING PRACTICE AND THEORY-
dc.citation.volume18-
dc.citation.number4-
dc.citation.startPage431-
dc.citation.endPage435-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.subject.keywordPlusCROSS-CLASSIFICATIONS-
dc.subject.keywordPlusORDERED CATEGORIES-
dc.subject.keywordPlusCONTINGENCY-TABLES-
dc.subject.keywordPlusASSOCIATION MODELS-
dc.subject.keywordAuthorData set-
dc.subject.keywordAuthorNetwork data modeling-
dc.subject.keywordAuthorNetwork data quantification-
dc.subject.keywordAuthorIntrusion detection-
dc.subject.keywordAuthorKDD CUP 99-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles
College of Science and Technology > Department of Electronics and Information Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE