Show simple item record

dc.contributor.convenorClark, A., McPherson, M., and Mohay, G.
dc.contributor.authorSithirasenan, Elankayer
dc.contributor.authorMuthukkumarasamy, Vallipuram
dc.contributor.authorMathews, Sunil
dc.contributor.editorClark, A.
dc.contributor.editorMcPherson, M.
dc.contributor.editorMohay, G.
dc.date.accessioned2017-05-03T13:58:43Z
dc.date.available2017-05-03T13:58:43Z
dc.date.issued2007
dc.date.modified2008-06-17T05:21:38Z
dc.identifier.refurihttp://conference.auscert.org.au/conf2007/
dc.identifier.urihttp://hdl.handle.net/10072/17878
dc.description.abstractHuge amounts of network traces can be collected from today's busy computer networks for various analysis. These traces could be used to detect intruders and other unusual events. Real time detection of outliers from large data sets can lead to effective intrusion detection and prevention. Presently, due to lack of fast on-the-fly updating and processing capabilities intrusion detection systems (IDSs) do not detect intruders instantly. Furthermore, most IDSs cannot adapt their detection mechanism in real time to accommodate legitimate dynamic changes. Achieving dynamic adaptation in real time has been a long standing desire for effective intrusion detection and prevention. Organizations which heavily rely on network activities are in need of an ID that could detect intruders in advance and stop them before they could cause chaos. In this context we propose a novel mechanism to detect intruders in real time. Our system monitors for timing and behavioral anomalies and uses outlier based data association techniques to substantiate the anomaly. In this paper we introduce the concept of views and their use in substantiating security threats. We have tested our concept on data captured from our experimental wireless network environment and we present the results obtained from our analysis.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.languageEnglish
dc.language.isoeng
dc.publisherAusCERT
dc.publisher.placeUQ, Brisbane, QLD
dc.publisher.urihttps://conference.auscert.org.au/
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofconferencename6th Asia Pacific Information Technology Security Conference (AusCERT 2007)
dc.relation.ispartofconferencetitleProceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007)
dc.relation.ispartofdatefrom2007-05-21
dc.relation.ispartofdateto2007-05-25
dc.relation.ispartoflocationGold Coast, Australia
dc.rights.retentionY
dc.subject.fieldofresearchHistory and Archaeology
dc.subject.fieldofresearchcode21
dc.titleSubstantiating Security Threats Using Different Views of Wireless Network Traces
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.date.issued2007
gro.hasfulltextNo Full Text
gro.griffith.authorMuthukkumarasamy, Vallipuram
gro.griffith.authorSithirasenan, Elankayer
gro.griffith.authorMathews, Sunil J.


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record