메뉴 건너뛰기




Volumn 32, Issue 2, 2002, Pages 154-160

Incorporating soft computing techniques into a probabilistic intrusion detection system

Author keywords

Anomaly detection; Fuzzy logic; Hidden Markov model; Intrusion detection system; Self organizing map; Soft computing

Indexed keywords

COMPUTER SIMULATION; FUZZY SETS; LEARNING ALGORITHMS; LEARNING SYSTEMS; MARKOV PROCESSES; MATHEMATICAL MODELS; MAXIMUM LIKELIHOOD ESTIMATION; MEMBERSHIP FUNCTIONS; PARAMETER ESTIMATION; PROBABILITY DISTRIBUTIONS; SELF ORGANIZING MAPS; VECTOR QUANTIZATION;

EID: 0036588773     PISSN: 10946977     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCC.2002.801356     Document Type: Article
Times cited : (92)

References (20)
  • 1
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection system
    • Mar.
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection system," IEEE Trans. Softw. Eng., vol. 21, pp. 181-199, Mar. 1995.
    • (1995) IEEE Trans. Softw. Eng. , vol.21 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 3
    • 33645767146 scopus 로고    scopus 로고
    • Netstat: A network-based intrusion detection approach
    • G. Vigna and R. A. Kemmerer, "Netstat: A network-based intrusion detection approach," in Proc. NISSC'98, Oct. 1998, pp. 338-347.
    • Proc. NISSC'98, Oct. 1998 , pp. 338-347
    • Vigna, G.1    Kemmerer, R.A.2
  • 4
    • 0031258214 scopus 로고    scopus 로고
    • Computer immunology
    • Oct.
    • S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Commun. ACM, vol. 40, no. 10, pp. 88-96, Oct. 1997.
    • (1997) Commun. ACM , vol.40 , Issue.10 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3
  • 5
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • June
    • T. F. Lunt, "A survey of intrusion detection techniques," Comput. Security, vol. 12, no. 4, pp. 405-418, June 1993.
    • (1993) Comput. Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 6
    • 0002629036 scopus 로고    scopus 로고
    • Emerald: Event monitoring enabling responses to anomalous live disturbances
    • P. A. Porras and P. G. Neumann, "Emerald: Event monitoring enabling responses to anomalous live disturbances," in Proc. 20th NISSC, Oct. 1997, pp. 353-365.
    • Proc. 20th NISSC, Oct. 1997 , pp. 353-365
    • Porras, P.A.1    Neumann, P.G.2
  • 7
    • 0028385414 scopus 로고
    • Fuzzy logic, neural networks, and soft computing
    • Mar.
    • L. A. Zadeh, "Fuzzy logic, neural networks, and soft computing," Commun. ACM, vol. 37, no. 3, pp. 77-84, Mar. 1994.
    • (1994) Commun. ACM , vol.37 , Issue.3 , pp. 77-84
    • Zadeh, L.A.1
  • 8
    • 84943242287 scopus 로고
    • Solaris 2.5 Sunshield basic security module guide
    • Sunsoft, "Solaris 2.5 Sunshield basic security module guide,", 1995.
    • (1995)
    • Sunsoft1
  • 9
    • 0033293396 scopus 로고    scopus 로고
    • Toward a taxonomy of intrusion-detection systems
    • H. Deba, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Comput. Networks, vol. 31, pp. 805-822, 1999.
    • (1999) Comput. Networks , vol.31 , pp. 805-822
    • Deba, H.1    Dacier, M.2    Wespi, A.3
  • 10
    • 0027668428 scopus 로고
    • Statistical foundations of audit trail analysis for the detection of computer misuse
    • Sept.
    • P. Helman and G. Liepins, "Statistical foundations of audit trail analysis for the detection of computer misuse," IEEE Trans. Softw. Eng., vol. 19, pp. 886-901, Sept. 1993.
    • (1993) IEEE Trans. Softw. Eng. , vol.19 , pp. 886-901
    • Helman, P.1    Liepins, G.2
  • 12
    • 0343421209 scopus 로고
    • Next generation intrusion detection expert system (NIDES)-1. Statistical algorithms rationale-2. Rationale for proposed resolver
    • SRI International, March, Tech. Rep. A016-Rationales
    • H. Javitz et al., "Next generation intrusion detection expert system (NIDES)-1. statistical algorithms rationale-2. rationale for proposed resolver," SRI International, March, Tech. Rep. A016-Rationales, 1993.
    • (1993)
    • Javitz, H.1
  • 14
    • 0032218214 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • T. Lane and C. E. Brodley, "Temporal sequence learning and data reduction for anomaly detection," in Proc. ACCS'98, 1997, pp. 150-158.
    • Proc. ACCS'98, 1997 , pp. 150-158
    • Lane, T.1    Brodley, C.E.2
  • 17
    • 0013439651 scopus 로고    scopus 로고
    • Intention modeling: Approximating computer user intentions for detection and prediction of intrusions
    • London, U.K.: Chapman & Hall, May
    • T. Spyrou and J. Darzentas, "Intention modeling: Approximating computer user intentions for detection and prediction of intrusions," in Information Systems Security. London, U.K.: Chapman & Hall, May 1996, pp. 39-335.
    • (1996) Information Systems Security , pp. 39-335
    • Spyrou, T.1    Darzentas, J.2
  • 19
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, pp. 257-286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , pp. 257-286
    • Rabiner, L.R.1
  • 20
    • 0011220965 scopus 로고    scopus 로고
    • Fuzzy inference systems
    • Englewood Cliffs, NJ: Prentice-Hall
    • J. S. R. Jang, "Fuzzy inference systems," in Neuro-Fuzzy and Soft Computing. Englewood Cliffs, NJ: Prentice-Hall, 1997.
    • (1997) Neuro-Fuzzy and Soft Computing
    • Jang, J.S.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.