메뉴 건너뛰기




Volumn 51, Issue 1, 2003, Pages 73-107

An empirical study of two approaches to sequence learning for anomaly detection

Author keywords

Anomaly detection; Application; Computer security; Hidden Markov models; Instance based learning

Indexed keywords

COMPUTER SYSTEMS; MARKOV PROCESSES; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 0037400054     PISSN: 08856125     EISSN: None     Source Type: Journal    
DOI: 10.1023/A:1021830128811     Document Type: Article
Times cited : (62)

References (67)
  • 1
    • 0025725905 scopus 로고
    • Instance-based learning algorithms
    • Aha, D., Kibler, D., & Albert, M. (1991). Instance-based learning algorithms. Machine Learning, 6:1, 37-66.
    • (1991) Machine Learning , vol.6 , Issue.1 , pp. 37-66
    • Aha, D.1    Kibler, D.2    Albert, M.3
  • 2
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Technical Report (unnumbered), Fort Washington, PA: James P. Anderson Co.
    • Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report (unnumbered), Fort Washington, PA: James P. Anderson Co.
    • (1980)
    • Anderson, J.P.1
  • 3
    • 0023453626 scopus 로고
    • Learning regular sets from queries and counterexamples
    • Angulin, D. (1987). Learning regular sets from queries and counterexamples. Information and Computation, 75, 87-106.
    • (1987) Information and Computation , vol.75 , pp. 87-106
    • Angulin, D.1
  • 5
    • 0003750241 scopus 로고    scopus 로고
    • An architecture for intrusion detection using autonomous agents
    • Technical Report COAST TR 98/05, Wes Lafayette, IN: Purdue University, COAST Laboratory
    • Balasubramaniyan, J. S., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E., & Zamboni, D. (1998). An architecture for intrusion detection using autonomous agents. Technical Report COAST TR 98/05, Wes Lafayette, IN: Purdue University, COAST Laboratory.
    • (1998)
    • Balasubramaniyan, J.S.1    Garcia-Fernandez, J.O.2    Isacoff, D.3    Spafford, E.4    Zamboni, D.5
  • 9
    • 0030130754 scopus 로고    scopus 로고
    • A multi-component nonlinear prediction system for the S&P 500 index
    • Chenoweth, T., & Obradovic, Z. (1996). A multi-component nonlinear prediction system for the S&P 500 index Neurocomputing, 10:3, 275-290.
    • (1996) Neurocomputing , vol.10 , Issue.3 , pp. 275-290
    • Chenoweth, T.1    Obradovic, Z.2
  • 10
    • 0013376454 scopus 로고    scopus 로고
    • Cis; San Jose, CA: Cisco Systems Inc.
    • Cis (1999). NetRanger 2.2.1 User Guide. Available on Cisco Documentation CD-ROM or at http://www.cisco.com/univercd/cc/td/doc/product/iaabu/netrangr/nr221ug/ index.htm. San Jose, CA: Cisco Systems Inc.
    • (1999) NetRanger 2.2.1 User Guide
  • 20
    • 0031211090 scopus 로고    scopus 로고
    • A decision-theoretic generalization of on-line learning and an application to boosting
    • Freund, Y., & Schapire, R. E. (1997). A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 55:1, 119-139.
    • (1997) Journal of Computer and System Sciences , vol.55 , Issue.1 , pp. 119-139
    • Freund, Y.1    Schapire, R.E.2
  • 22
    • 4243663339 scopus 로고    scopus 로고
    • Current computer virus threats, countermeasures, and strategic solutions
    • White paper, McAfee Associates
    • Gordon, S. (1996). Current computer virus threats, countermeasures, and strategic solutions. White paper, McAfee Associates.
    • (1996)
    • Gordon, S.1
  • 23
    • 0013420742 scopus 로고
    • Using UNIX: Collected traces of 168 users
    • Technical Report 88/333/45, Alberta, Canada: University of Calgary, Department of Computer Science, Includes tar-format cartridge tape
    • Greenberg, S. (1988). Using UNIX: Collected traces of 168 users. Technical Report 88/333/45, Alberta, Canada: University of Calgary, Department of Computer Science, Includes tar-format cartridge tape.
    • (1988)
    • Greenberg, S.1
  • 25
    • 0013325562 scopus 로고    scopus 로고
    • ISS; Atlanta, GA: Internet Security Systems
    • ISS (2000). RealSecure Product Datasheet. Available at http://www.iss.net/customer-care/resource-center/product-lit Atlanta, GA: Internet Security Systems.
    • (2000) RealSecure Product Datasheet
  • 26
    • 0021494282 scopus 로고
    • On the hidden Markov model and dynamic time warping for speech recognition - A unified view
    • Juang, B.-H. (1984). On the hidden Markov model and dynamic time warping for speech recognition - A unified view. AT&T Bell Laboratories Technical Journal, 63:7, 1213-1243.
    • (1984) AT&T Bell Laboratories Technical Journal , vol.63 , Issue.7 , pp. 1213-1243
    • Juang, B.-H.1
  • 27
    • 0003900915 scopus 로고
    • An application of pattern matching in intrusion detection
    • Technical Report CSD-TR-94-013, West Lafayette, IN: Purdue University, Computer Science
    • Kumar, S., & Spafford, E. (1994). An application of pattern matching in intrusion detection. Technical Report CSD-TR-94-013, West Lafayette, IN: Purdue University, Computer Science.
    • (1994)
    • Kumar, S.1    Spafford, E.2
  • 28
    • 0028404750 scopus 로고
    • Discrete sequence prediction and its applications
    • Laird, P., & Saul, R. (1994). Discrete sequence prediction and its applications. Machine Learning. 15:1, 43-68.
    • (1994) Machine Learning , vol.15 , Issue.1 , pp. 43-68
    • Laird, P.1    Saul, R.2
  • 29
    • 4243352332 scopus 로고    scopus 로고
    • Filtering techniques for rapid user classification
    • WS-98-07, Menlo Park, CA: AAAI Press
    • Lane, T. (1998). Filtering techniques for rapid user classification. WS-98-07, Menlo Park, CA: AAAI Press.
    • (1998)
    • Lane, T.1
  • 31
    • 0013425679 scopus 로고    scopus 로고
    • Machine learning techniques for the computer security domain of anomaly detection
    • Ph.D. thesis, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering
    • Lane, T. (2000). Machine Learning Techniques for the Computer Security Domain of Anomaly Detection. Ph.D. thesis, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering.
    • (2000)
    • Lane, T.1
  • 32
    • 0003027845 scopus 로고    scopus 로고
    • An application of machine learning to anomaly detection
    • Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
    • Lane, T., & Brodley, C. E. (1997a). An application of machine learning to anomaly detection. In Proceedings of the Twentieth National Information Systems Security Conference (Vol 1, pp. 366-380). Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
    • (1997) Proceedings of the Twentieth National Information Systems Security Conference , vol.1 , pp. 366-380
    • Lane, T.1    Brodley, C.E.2
  • 33
    • 0013378353 scopus 로고    scopus 로고
    • Detecting the abnormal: Machine learning in computer security
    • Technical Report TR-ECE 97-1, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering
    • Lane, T., & Brodley, C. E. (1997b). Detecting the abnormal: Machine learning in computer security. Technical Report TR-ECE 97-1, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering.
    • (1997)
    • Lane, T.1    Brodley, C.E.2
  • 36
  • 40
    • 0030287048 scopus 로고    scopus 로고
    • The expectation-maximization algorithm
    • (November)
    • Moon, T. K. (1996, November). The expectation-maximization algorithm. IEEE Signal Processing Magazine, 47-59.
    • (1996) IEEE Signal Processing Magazine , pp. 47-59
    • Moon, T.K.1
  • 43
    • 0028737501 scopus 로고
    • Heterogeneous learning in the Doppelgänger user modeling system
    • Orwant, J. (1995). Heterogeneous learning in the Doppelgänger user modeling system. User Modeling and User-Adapted Interaction, 4:2, 107-130.
    • (1995) User Modeling and User-Adapted Interaction , vol.4 , Issue.2 , pp. 107-130
    • Orwant, J.1
  • 45
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
    • Porras, P., & Neumann, P. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the Twentieth National Information Systems Security Conference (pp. 353-365). Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
    • (1997) Proceedings of the Twentieth National Information Systems Security Conference , pp. 353-365
    • Porras, P.1    Neumann, P.2
  • 49
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77:2.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2
    • Rabiner, L.R.1
  • 53
    • 0026156490 scopus 로고
    • A nearest hyperrectangular learning method
    • Salzberg, S. A nearest hyperrectangular learning method. Machine Learning, 6:3, 251-276.
    • (1991) Machine Learning , vol.6 , Issue.3 , pp. 251-276
    • Salzberg, S.1
  • 54
    • 0029365976 scopus 로고
    • Locating protein coding regions in human DNA using a decision tree algorithm
    • Salzberg, S. (1995). Locating protein coding regions in human DNA using a decision tree algorithm. Journal of Computational Biology, 2:3, 473-485.
    • (1995) Journal of Computational Biology , vol.2 , Issue.3 , pp. 473-485
    • Salzberg, S.1
  • 55
    • 0013372364 scopus 로고
    • Cross-validation, stacking, and bi-level methods for stacking: Meta-methods for classification learning
    • In P. Cheeseman, & W. Oldford (Eds.); New York: Springer-Verlag
    • Schaffer, C. (1994). Cross-validation, stacking, and bi-level methods for stacking: Meta-methods for classification learning. In P. Cheeseman, & W. Oldford (Eds.), Selecting models from data: Artificial intelligence and Statistics IV. New York: Springer-Verlag.
    • (1994) Selecting Models from Data: Artificial Intelligence and Statistics IV
    • Schaffer, C.1
  • 56
    • 0013326380 scopus 로고    scopus 로고
    • Personal communication
    • Schonlau, M. (2000). Personal communication.
    • (2000)
    • Schonlau, M.1
  • 60
    • 0028667329 scopus 로고
    • Hidden Markov monitoring for fault detection in dynamic systems
    • Smyth, P. (1994a). Hidden Markov monitoring for fault detection in dynamic systems. Pattern Recognition, 27:1, 149-164.
    • (1994) Pattern Recognition , vol.27 , Issue.1 , pp. 149-164
    • Smyth, P.1
  • 65
    • 0037636215 scopus 로고    scopus 로고
    • Intrusion detection using variable-length audit trail patterns
    • Technical Report RZ 3164 (# 93210), Zurich, Switzerland: IBM Research
    • Wespi, A., Darcier, M., & Debar, H. (1999). Intrusion detection using variable-length audit trail patterns. Technical Report RZ 3164 (# 93210), Zurich, Switzerland: IBM Research.
    • (1999)
    • Wespi, A.1    Darcier, M.2    Debar, H.3
  • 66
    • 0343081513 scopus 로고    scopus 로고
    • Reduction techniques for exemplar-based learning algorithms
    • Wilson, D. R., & Martinez, T. R. (2000). Reduction techniques for exemplar-based learning algorithms. Machine Learning, 38:3, 257-268.
    • (2000) Machine Learning , vol.38 , Issue.3 , pp. 257-268
    • Wilson, D.R.1    Martinez, T.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.