메뉴 건너뛰기




Volumn , Issue , 2002, Pages 386-395

ADMIT: Anomaly-based data mining for intrusions

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; DATA STRUCTURES; REAL TIME SYSTEMS; SECURITY OF DATA; USER INTERFACES;

EID: 0242456797     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (198)

References (22)
  • 1
    • 0025725905 scopus 로고
    • Instance-based learning algorithms
    • D. Aha, D. Kibler, M. Albert. Instance-based learning algorithms. Machine learning, 6(1):37-66, 1991.
    • (1991) Machine Learning , vol.6 , Issue.1 , pp. 37-66
    • Aha, D.1    Kibler, D.2    Albert, M.3
  • 3
    • 0142222738 scopus 로고    scopus 로고
    • Detection and classification of intrusions and faults using sequences of system calls
    • December
    • J.B.D. Cabrera, L. Lewis, R.K. Mehra. Detection and Classification of Intrusions and Faults using Sequences of System Calls. SIGMOD Record, 30(4), pp 25-34. December 2001.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 25-34
    • Cabrera, J.B.D.1    Lewis, L.2    Mehra, R.K.3
  • 6
    • 0012297627 scopus 로고    scopus 로고
    • Computer intrusion detection based on bayes factors for comparing command transition probabilities
    • In National Institute of Statistical Sciences Tech. Report 91, February
    • W. DuMouchel. Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities. In National Institute of Statistical Sciences Tech. Report 91, February 1999.
    • (1999)
    • DuMouchel, W.1
  • 10
    • 0013425679 scopus 로고    scopus 로고
    • Machine learning techniques for the computer security domain of anomaly detection
    • Ph. D. Thesis, CERIAS TR 2000-12, Purdue University, August
    • T. Lane. Machine Learning Techniques for the Computer Security Domain of Anomaly Detection. Ph. D. Thesis, CERIAS TR 2000-12, Purdue University, August 2000.
    • (2000)
    • Lane, T.1
  • 12
    • 0242529343 scopus 로고    scopus 로고
    • Out of the NOC(a) and into the boardroom: Director and officer responsibility for information security
    • July 30
    • D. J. Langin. Out of the NOC(a) and Into the Boardroom: Director and Officer Responsibility for Information Security. July 30, 2001. URL: http://www.recourse.com/news/press/releases/r073001.html
    • (2001)
    • Langin, D.J.1
  • 20
    • 84944220475 scopus 로고    scopus 로고
    • Adaptive, model-based monitoring for cyber attack detection
    • Springer-Verlag; October
    • A. Valdes, K. Skinner. Adaptive, Model-based Monitoring for Cyber Attack Detection, Lecture Notes in CS, No. 1907, Springer-Verlag, pp. 80-92, October 2000.
    • (2000) Lecture Notes in CS, No. 1907 , Issue.1907 , pp. 80-92
    • Valdes, A.1    Skinner, K.2
  • 22
    • 24444453801 scopus 로고    scopus 로고
    • Using clustering to detect abnormal behavior in a distributed intrusion detection system
    • Unreleased Technical Report, Purdue University. August
    • D. Zamboni. Using clustering to detect abnormal behavior in a distributed intrusion detection system. Unreleased Technical Report, Purdue University. August, 2001.
    • (2001)
    • Zamboni, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.