메뉴 건너뛰기




Volumn 24, Issue 2, 2005, Pages 160-168

Empirical evaluation of SVM-based masquerade detection using UNIX commands

Author keywords

Anomaly detection; Intrusion detection; Machine learning; Masquerade detection; Support vector machine (SVM)

Indexed keywords

CODES (SYMBOLS); COMPUTER OPERATING SYSTEMS; COMPUTER SYSTEM FIREWALLS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION TECHNOLOGY; LEARNING SYSTEMS;

EID: 17844372755     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2004.08.007     Document Type: Article
Times cited : (62)

References (18)
  • 2
    • 27144489164 scopus 로고    scopus 로고
    • A tutorial on support vector machines for pattern recognition
    • Christopher J.C. Burges A tutorial on support vector machines for pattern recognition Data Mining and Knowledge Discovery 2 2 1998 121 167
    • (1998) Data Mining and Knowledge Discovery , vol.2 , Issue.2 , pp. 121-167
    • Burges Christopher, J.C.1
  • 4
    • 0033656184 scopus 로고    scopus 로고
    • Hierarchical classification of Web content
    • 23rd ACM International Conference on Research and Development in Information Retrieval
    • Dumais Susan T, Chen Hao. Hierarchical classification of Web content. In: Proceedings of SIGIR-00, 23rd ACM International Conference on Research and Development in Information Retrieval; 2000. p. 256-63.
    • (2000) Proceedings of SIGIR-00 , pp. 256-263
    • Dumais Susan, T.1    Hao, C.2
  • 5
    • 84958740656 scopus 로고    scopus 로고
    • Anomaly detection enhanced classification in computer intrusion detection
    • Mike Fugate, and James R. Gattier Anomaly detection enhanced classification in computer intrusion detection SVM 2002 LNCS 2388 May 2002 p. 186-197
    • (2002) LNCS 2388
    • Mike, F.1    Gattier James, R.2
  • 6
    • 0013420742 scopus 로고
    • Using Unix: Collected traces of 168 users
    • Department Computer Science, University Calgary, Calgary, Canada
    • Greenberg Saul. Using Unix: collected traces of 168 users. Research report 88/333/45, Department Computer Science, University Calgary, Calgary, Canada; 1988.
    • (1988) Research Report 88/333/45
    • Saul, G.1
  • 8
    • 0003307180 scopus 로고    scopus 로고
    • Estimating the generalization performance of a SVM efficiently
    • 17th International Conference on Machine Learning
    • Joachims Thorsten. Estimating the generalization performance of a SVM efficiently. In: Proceedings of ICML-00, 17th International Conference on Machine Learning; 2000. p. 431-8.
    • (2000) Proceedings of ICML-00 , pp. 431-438
    • Thorsten, J.1
  • 10
    • 85084163349 scopus 로고    scopus 로고
    • Stolfo Salvatore. Data mining approaches for intrusion detection
    • San Antonio, TX
    • Lee Wenke, Stolfo Salvatore. Data mining approaches for intrusion detection. In: Proceedings of 7th USENIX Security Symposium, San Antonio, TX; 1998.
    • (1998) Proceedings of 7th USENIX Security Symposium
    • Wenke, L.1
  • 18
    • 85024373635 scopus 로고    scopus 로고
    • A re-examination of text categorization methods
    • 22nd ACM international conference on research and development in information retrieval
    • Yang Yiming, Liu Xin. A re-examination of text categorization methods. In: Proceedings of SIGIR-99, 22nd ACM international conference on research and development in information retrieval; 1999. p. 42-9.
    • (1999) Proceedings of SIGIR-99 , pp. 42-49
    • Yiming, Y.1    Xin, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.