메뉴 건너뛰기




Volumn 45, Issue 1, 2004, Pages 51-67

Statistical anomaly detection via httpd data analysis

Author keywords

Anomaly detection; Process trace; System calls

Indexed keywords

COMPUTATIONAL METHODS; PROBLEM SOLVING; STATISTICAL METHODS;

EID: 0442296745     PISSN: 01679473     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-9473(03)00115-4     Document Type: Article
Times cited : (14)

References (10)
  • 4
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • Hofmeyr S. Forrest S. Somayaji A. Intrusion detection using sequences of system calls J. Comput. Security 6 1998 151-180
    • (1998) J. Comput. Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 6
    • 0019608720 scopus 로고
    • Formal models for computer security
    • Landwehr C.E. Formal models for computer security ACM Comput. Surveys 13 1981 247-278
    • (1981) ACM Comput. Surveys , vol.13 , pp. 247-278
    • Landwehr, C.E.1
  • 7
    • 0035638121 scopus 로고    scopus 로고
    • Computing scan statistic p-values using importance sampling with applications to genetics and medical image analysis
    • Naiman D.Q. Priebe C.E. Computing scan statistic p-values using importance sampling with applications to genetics and medical image analysis J. Comput. Graph. Statist. 10 2001 296-328
    • (2001) J. Comput. Graph. Statist. , vol.10 , pp. 296-328
    • Naiman, D.Q.1    Priebe, C.E.2
  • 8
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • Rabiner L.R. Juang B.H. An introduction to hidden Markov models IEEE ASSP Magazine 3 1986 4-16
    • (1986) IEEE ASSP Magazine , vol.3 , pp. 4-16
    • Rabiner, L.R.1    Juang, B.H.2
  • 10
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • IEEE Computer Soc. Press, Silver Spring, MD
    • Warrander, C., Forrest, S., Pearlmutter, B., 1999. Detecting intrusions using system calls: Alternative data models. 1999 IEEE Symposium on Security and Privacy. IEEE Computer Soc. Press, Silver Spring, MD, pp. 133-145.
    • (1999) 1999 IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrander, C.1    Forrest, S.2    Pearlmutter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.