메뉴 건너뛰기




Volumn , Issue , 2002, Pages 219-228

Masquerade detection using truncated command lines

Author keywords

[No Author keywords available]

Indexed keywords

MASQUERADE ATTACK; MASQUERADE DETECTION; TRUNCATED COMMAND LINES;

EID: 0036931591     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2002.1028903     Document Type: Conference Paper
Times cited : (200)

References (14)
  • 2
    • 0002419948 scopus 로고    scopus 로고
    • Beyond independence: Conditions for the optimality of the simple Bayesian classifier
    • In L. Saitta, editor; July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California
    • P. Domingos and M. Pazzani. Beyond independence: conditions for the optimality of the simple Bayesian classifier. In L. Saitta, editor, 13th International Conference on Machine Learning (ICML-96), pages 105-112, 03-06 July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California, 1996.
    • (1996) 13th International Conference on Machine Learning (ICML-96) , pp. 105-112
    • Domingos, P.1    Pazzani, M.2
  • 3
    • 0012297627 scopus 로고    scopus 로고
    • Computer intrusion detection based on Bayes factors for comparing command transition probabilities
    • Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, North Carolina 27709-4006
    • W. DuMouchel. Computer intrusion detection based on Bayes factors for comparing command transition probabilities. Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, North Carolina 27709-4006, 1999.
    • (1999)
    • Dumouchel, W.1
  • 4
    • 0012291134 scopus 로고    scopus 로고
    • A hybrid high-order markov chain model for computer intrusion detection
    • Technical Report 92, National Institute for Statistical Sciences, Research Triangle Park, North Carolina 27709-4006
    • W. Ju and Y. Vardi. A hybrid high-order markov chain model for computer intrusion detection. Technical Report 92, National Institute for Statistical Sciences, Research Triangle Park, North Carolina 27709-4006, 1999.
    • (1999)
    • Ju, W.1    Vardi, Y.2
  • 5
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • August
    • T. Lane and C. E. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.3 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 6
    • 0012291135 scopus 로고    scopus 로고
    • Spy case prompts computer search
    • 05 March
    • V. Loeb. Spy case prompts computer search. Washington Post, 05 March 2001, page A01.
    • (2001) Washington Post
    • Loeb, V.1
  • 7
    • 0027609384 scopus 로고
    • A survey of intrusion-detection techniques
    • June
    • T. F. Lunt. A survey of intrusion-detection techniques. Computers & Security, 12(4):405-418, June 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 8
    • 0023866666 scopus 로고
    • A prototype real-time intrusion-detection expert system
    • 18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC
    • T. F. Lunt and R. Jagannathan. A prototype real-time intrusion-detection expert system. In IEEE Symposium on Security and Privacy, pages 59-66. 18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC, 1988.
    • (1988) IEEE Symposium on Security and Privacy , pp. 59-66
    • Lunt, T.F.1    Jagannathan, R.2
  • 11
    • 0004255908 scopus 로고    scopus 로고
    • McGraw-Hill, Boston, Massachusetts
    • T. M. Mitchell. Machine Learning. McGraw-Hill, Boston, Massachusetts, 1997.
    • (1997) Machine Learning.
    • Mitchell, T.M.1
  • 13
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • November
    • M. Schonlau and M. Theus. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters, 76(1-2):33-38, November 2000.
    • (2000) Information Processing Letters , vol.76 , Issue.1-2 , pp. 33-38
    • Schonlau, M.1    Theus, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.