메뉴 건너뛰기




Volumn 53, Issue 1, 2004, Pages 116-123

Robustness of the Markov-chain model for cyber-attack detection

Author keywords

Computer audit data; Computer security; Intrusion detection; Markov chain

Indexed keywords

ALGORITHMS; COMPUTER WORKSTATIONS; INFERENCE ENGINES; LEARNING ALGORITHMS; PATTERN RECOGNITION; SECURITY OF DATA; UNIX;

EID: 1942436335     PISSN: 00189529     EISSN: None     Source Type: Journal    
DOI: 10.1109/TR.2004.823851     Document Type: Article
Times cited : (177)

References (56)
  • 4
    • 0346482196 scopus 로고    scopus 로고
    • Building big brother
    • Jan.
    • B. Simons, "Building big brother," Commun. ACM, vol. 43, no. 1, pp. 31-32, Jan. 2000.
    • (2000) Commun. ACM , vol.43 , Issue.1 , pp. 31-32
    • Simons, B.1
  • 5
    • 85001840137 scopus 로고    scopus 로고
    • Risks of insiders
    • Dec.
    • P. G. Neumann, "Risks of insiders," Commun. ACM, vol. 42, no. 12, p. 160, Dec. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 160
    • Neumann, P.G.1
  • 6
    • 0006890506 scopus 로고    scopus 로고
    • Net to worry
    • Dec.
    • M. Godwin, "Net to worry," Commun. ACM, vol. 42, no. 12, pp. 15-17, Dec. 1999.
    • (1999) Commun. ACM , vol.42 , Issue.12 , pp. 15-17
    • Godwin, M.1
  • 7
    • 0344614689 scopus 로고    scopus 로고
    • Surviving information warfare attacks
    • Apr.
    • S. Jajodia, P. Ammann, and C. D. McCollum, "Surviving information warfare attacks," Computer, vol. 32, no. 3, pp. 57-63, Apr. 1999.
    • (1999) Computer , vol.32 , Issue.3 , pp. 57-63
    • Jajodia, S.1    Ammann, P.2    McCollum, C.D.3
  • 8
    • 0006890846 scopus 로고    scopus 로고
    • Pentagon confronts mounting cyber risks
    • Mar.
    • P. Mann, "Pentagon confronts mounting cyber risks," Aviation Week and Space Technology, vol. 150, no. 12, pp. 82-83, Mar. 1999.
    • (1999) Aviation Week and Space Technology , vol.150 , Issue.12 , pp. 82-83
    • Mann, P.1
  • 9
    • 85008030889 scopus 로고    scopus 로고
    • Computer security research: A British perspective
    • Sept./Oct.
    • B. H. Barnes, "Computer security research: A British perspective," IEEE Software, vol. 15, no. 4, pp. 30-33, Sept./Oct., 1998.
    • (1998) IEEE Software , vol.15 , Issue.4 , pp. 30-33
    • Barnes, B.H.1
  • 10
    • 0031673674 scopus 로고    scopus 로고
    • Catapults and grappling hooks: The tools and techniques of information warfare
    • A. Boulanger, "Catapults and grappling hooks: The tools and techniques of information warfare," IBM Systems J, vol. 37, no. 1, pp. 106-114, 1998.
    • (1998) IBM Systems J , vol.37 , Issue.1 , pp. 106-114
    • Boulanger, A.1
  • 11
    • 0033293396 scopus 로고    scopus 로고
    • Toward a taxonomy of intrusion-detection systems
    • H. Debar, M. Dacier, and A. Wespi, "Toward a taxonomy of intrusion-detection systems," Computer Networks, vol. 31, pp. 805-822, 1999.
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 12
  • 14
    • 0347742772 scopus 로고    scopus 로고
    • Intrusion detection systems and multi-sensor data fusion
    • Apr.
    • T. Bass, "Intrusion detection systems and multi-sensor data fusion," Commun. ACM, vol. 43, no. 3, pp. 99-105, Apr. 2000.
    • (2000) Commun. ACM , vol.43 , Issue.3 , pp. 99-105
    • Bass, T.1
  • 15
    • 0002675748 scopus 로고    scopus 로고
    • Intrusion detection for distributed applications
    • July
    • M. Stillerman, C. Marceau, and M. Stillman, "Intrusion detection for distributed applications," Commun. ACM, vol. 42, no. 6, pp. 62-69, July 1999.
    • (1999) Commun. ACM , vol.42 , Issue.6 , pp. 62-69
    • Stillerman, M.1    Marceau, C.2    Stillman, M.3
  • 17
    • 0002629036 scopus 로고    scopus 로고
    • EMERALD: Event monitoring enabling responses to anomalous live disturbances
    • P. A. Porras and P. G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," in Proc. NISSC, Oct. 1997.
    • Proc. NISSC, Oct. 1997
    • Porras, P.A.1    Neumann, P.G.2
  • 25
    • 0003518833 scopus 로고
    • Classification and detection of computer intrusions
    • Ph.D. Dissertation, Dept. Computer Science, Purdue University
    • S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. Dissertation, Dept. Computer Science, Purdue University, 1995.
    • (1995)
    • Kumar, S.1
  • 27
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • C. Ko, G. Fink, and K. Levitt, "Execution monitoring of security-critical programs in distributed systems: A specification-based approach," in Proc. 1997 IEEE Symp. Security and Privacy, pp. 134-144.
    • Proc. 1997 IEEE Symp. Security and Privacy , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 29
    • 84962259930 scopus 로고    scopus 로고
    • Building survivable systems: An integrated approach based on intrusion detection and damage containment
    • T. Bowen et al., "Building survivable systems: An integrated approach based on intrusion detection and damage containment," in Proc. 2000 DARPA Information Survivability Conf. Exposition, vol. II, pp. 84-99.
    • Proc. 2000 DARPA Information Survivability Conf. Exposition , vol.2 , pp. 84-99
    • Bowen, T.1
  • 30
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Feb.
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Trans. Software Eng. , vol.SE-13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 31
    • 0003964874 scopus 로고
    • Next-generation intrusion detection expert system (NIDES): A summary
    • Menlo Park, CA, Technical Report SRI-CSL-97-07, May; SRI Int'l.
    • D. Anderson, T. Frivold, and A. Valdes, "Next-Generation Intrusion Detection Expert System (NIDES): A Summary,", Menlo Park, CA, Technical Report SRI-CSL-97-07, May 1995. SRI Int'l.
    • (1995)
    • Anderson, D.1    Frivold, T.2    Valdes, A.3
  • 33
    • 0004118981 scopus 로고
    • The NIDES statistical component description of justification
    • Menlo Park, CA, Technical Report A010, Mar.; SRI Int'l.
    • ____, "The NIDES Statistical Component Description of Justification,", Menlo Park, CA, Technical Report A010, Mar. 1994. SRI Int'l.
    • (1994)
    • Javitz, H.S.1    Valdes, A.2
  • 34
    • 84962306569 scopus 로고    scopus 로고
    • Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
    • Y. Jou et al., "Design and implementation of a scalable intrusion detection system for the protection of network infrastructure," in Proc. 2000 DARPA Information Survivability Conf. Exposition, pp. 69-83.
    • Proc. 2000 DARPA Information Survivability Conf. Exposition , pp. 69-83
    • Jou, Y.1
  • 39
    • 0031258214 scopus 로고    scopus 로고
    • Computer immunology
    • Oct.
    • S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Computer immunology," Commun. ACM, vol. 40, no. 9, pp. 88-96, Oct., 1997.
    • (1997) Commun. ACM , vol.40 , Issue.9 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3
  • 42
    • 0012297627 scopus 로고    scopus 로고
    • Computer intrusion detection based on bayes factors for comparing command transition probabilities
    • National Institute of Statistical Sciences
    • W. DuMouchel. Computer Intrusion Detection Based on Bayes factors for Comparing Command Transition Probabilities. National Institute of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
    • DuMouchel, W.1
  • 43
    • 0012291134 scopus 로고    scopus 로고
    • A hybrid high-order Markov-chain model for computer intrusion detection
    • National Institute of Statistical Sciences
    • W.-H. Ju and Y. Vardi. A Hybrid High-Order Markov-Chain Model for Computer Intrusion Detection. National Institute of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
    • Ju, W.-H.1    Vardi, Y.2
  • 44
    • 1942443747 scopus 로고    scopus 로고
    • Computer intrusion: Detecting masquerades
    • National Inst. of Statistical Sciences
    • M. Schonlau et al. Computer Intrusion: Detecting Masquerades. National Inst. of Statistical Sciences. [Online]. Available: http://www.niss.org/downloadabletechreports.html
    • Schonlau, M.1
  • 45
    • 0006889822 scopus 로고    scopus 로고
    • Detecting network intrusion using a Markov modulated nonhomogeneous poisson process
    • S. L. Scott, Detecting Network Intrusion Using a Markov Modulated Nonhomogeneous Poisson Process.
    • Scott, S.L.1
  • 47
    • 1942539893 scopus 로고    scopus 로고
    • A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities
    • W. DuMouchel and M. Schonlau, "A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities," in Proc. #30 Symp. Interface: Computing Science and Statistics.
    • Proc. #30 Symp. Interface: Computing Science and Statistics
    • DuMouchel, W.1    Schonlau, M.2
  • 48
    • 1942539890 scopus 로고    scopus 로고
    • Cyber attack detection through a Markov-chain model of computer event transitions
    • submitted
    • N. Ye, Cyber attack detection through a Markov-chain model of computer event transitions, in IEEE Trans. Systems, Man and Cybernetics. submitted.
    • IEEE Trans. Systems, Man and Cybernetics
    • Ye, N.1
  • 55
    • 1942475925 scopus 로고    scopus 로고
    • EWMA techniques for detecting computer intrusions through anomalous changes in event intensity
    • Mar.
    • N. Ye and Q. Chen, "EWMA techniques for detecting computer intrusions through anomalous changes in event intensity," IEEE Trans. Rel., vol. 52, no. 1, Mar. 2004.
    • (2004) IEEE Trans. Rel. , vol.52 , Issue.1
    • Ye, N.1    Chen, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.