Skip to main content

Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks

  • Conference paper
Computational Science and Its Applications - ICCSA 2006 (ICCSA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3983))

Included in the following conference series:

Abstract

Home networks will be widely established in residential areas. Intrusion detection is an important function in the home gateway because various networks try to access to home networks. We propose the home gateway with the automated real time intrusion detection adjustable in home network environment using the clustering methodology and the correlation. Our proposed model showed the reasonable misclassification rates.

This work was supported by University IT Research Center(ITRC) Project and Electronics and Telecommunication Research Institute(ETRI) Project.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Saito, T., Tomoda, I., Takabatake, Y., Arni, J., Teramoto, K.: Home gateway architecture and its implementation. IEEE Transactions on Consumer Electronics, 1161–1166 (November 2000)

    Google Scholar 

  2. Jiang, Z., Kim, S., Lee, K., Bae, H., Kim, S.: Security Service Framework for Home Network. In: The Fourth Annual ACIS International Conference on Computer and Information Science (ICIS 2005), July 2005, pp. 233–238 (2005)

    Google Scholar 

  3. Jin, S.-Y., Yeung, D.S.: DDoS detection based on feature space modeling. In: 2004 International Conference on Machine Learning and Cybernetics, August 2004, pp. 4210–4215 (2004)

    Google Scholar 

  4. Germano, T.: Self Organizing Maps, Available in http://davis.wpi.edu/~matt/courses/soms/

  5. Gonzalez, F., Dasgupta, D.: Neuro-Immune and Self-Organizing Map Approaches to Anomaly Detection: A comparison. In: ICARIS (2002)

    Google Scholar 

  6. Jirapummin, C., Wattanapongsakorn, N., Kanthamanon, P.: Hybrid Neural Networks for Intrusion Detection System. King Mongkut’s University of Technology Thonburi (2001)

    Google Scholar 

  7. Pearson Correlation Coefficient, Available in http://www.indstate.edu/nurs/mary/N322/pearsonr.html/

  8. KDD Cup 1999 Data, Available in http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  9. Gunes Kayacik, H., Nur Zuncir-Heywood, A., Heywood, M.I.: On the Capability of an SOM based Intrusion Detection System. In: International Joint Conference on Neural Networks (2003)

    Google Scholar 

  10. Vesanto, J., Himberg, J., Alhoniemi, E., Parhankangas, J.: SOM Toolbox for Matlab 5, SOM Toolbox Team, Helsinki University of Technology (2000)

    Google Scholar 

  11. Kim, M., Na, H., Chae, K., Bang, H., Na, J.: A Combined Data Mining Approach for DDos Attack Detection. In: Kahng, H.-K., Goto, S. (eds.) ICOIN 2004. LNCS, vol. 3090, pp. 943–950. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Oh, H., Lim, J., Chae, K., Nah, J. (2006). Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_48

Download citation

  • DOI: https://doi.org/10.1007/11751632_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34077-5

  • Online ISBN: 978-3-540-34078-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics