Show simple item record

dc.contributor.convenorClark, A., McPherson, M., and Mohay, G.en_AU
dc.contributor.authorSithirasenan, Elankayeren_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.authorMathews, Sunilen_US
dc.contributor.editorClark, A., McPherson, M., and Mohay, G.en_US
dc.date.accessioned2017-04-24T11:12:36Z
dc.date.available2017-04-24T11:12:36Z
dc.date.issued2007en_US
dc.date.modified2008-06-17T05:21:38Z
dc.identifier.refurihttp://conference.auscert.org.au/conf2007/en_AU
dc.identifier.urihttp://hdl.handle.net/10072/17878
dc.description.abstractHuge amounts of network traces can be collected from today's busy computer networks for various analysis. These traces could be used to detect intruders and other unusual events. Real time detection of outliers from large data sets can lead to effective intrusion detection and prevention. Presently, due to lack of fast on-the-fly updating and processing capabilities intrusion detection systems (IDSs) do not detect intruders instantly. Furthermore, most IDSs cannot adapt their detection mechanism in real time to accommodate legitimate dynamic changes. Achieving dynamic adaptation in real time has been a long standing desire for effective intrusion detection and prevention. Organizations which heavily rely on network activities are in need of an ID that could detect intruders in advance and stop them before they could cause chaos. In this context we propose a novel mechanism to detect intruders in real time. Our system monitors for timing and behavioral anomalies and uses outlier based data association techniques to substantiate the anomaly. In this paper we introduce the concept of views and their use in substantiating security threats. We have tested our concept on data captured from our experimental wireless network environment and we present the results obtained from our analysis.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherAusCERTen_US
dc.publisher.placeUQ, Brisbane, QLDen_US
dc.publisher.urihttp://conference.auscert.org.au/conf2007/en_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofconferencename6th Asia Pacific Information Technology Security Conference (AusCERT 2007)en_US
dc.relation.ispartofconferencetitleProceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007)en_US
dc.relation.ispartofdatefrom2007-05-21en_US
dc.relation.ispartofdateto2007-05-25en_US
dc.relation.ispartoflocationGold Coast, Australiaen_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchHISTORY AND ARCHAEOLOGYen_US
dc.subject.fieldofresearchcode210000en_US
dc.titleSubstantiating Security Threats Using Different Views of Wireless Network Tracesen_US
dc.typeConference outputen_US
dc.type.descriptionE1 - Conference Publications (HERDC)en_US
dc.type.codeE - Conference Publicationsen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.date.issued2007
gro.hasfulltextNo Full Text


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record