메뉴 건너뛰기




Volumn 2820, Issue , 2003, Pages 207-219

Two sophisticated techniques to improve HMM-based intrusion detection systems

Author keywords

Anomaly detection; Combining multiple models; Hidden Markov model; Privilege flow

Indexed keywords

COMPUTER CRIME; ERROR DETECTION; ERRORS; HIDDEN MARKOV MODELS; MARKOV PROCESSES; MERCURY (METAL); REAL TIME SYSTEMS;

EID: 21144432658     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45248-5_12     Document Type: Article
Times cited : (13)

References (14)
  • 7
    • 0013459754 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • December
    • D. Y. Yeung and Y. Ding. "Host-based intrusion detection using dynamic and static behavioral models," The Journal of the Pattern Recognition society, December 2001.
    • (2001) The Journal of the Pattern Recognition Society
    • Yeung, D.Y.1    Ding, Y.2
  • 8
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 9
    • 0022594196 scopus 로고
    • An introduction to hidden Markov models
    • January
    • L. R. Rabiner and B.H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, pp. 4-16, January 1986.
    • (1986) IEEE ASSP Magazine , pp. 4-16
    • Rabiner, L.R.1    Juang, B.H.2
  • 10
    • 0006062387 scopus 로고    scopus 로고
    • Generation of application level audit data via library interposition
    • COAST Laboratory, Purdue University, West Lafaytte, IN, October
    • B. A. Kuperman and Eugene H. Spafford. "Generation of application level audit data via library interposition", CERIAS TR 99-11, COAST Laboratory, Purdue University, West Lafaytte, IN, October 1998.
    • (1998) CERIAS TR 99-11
    • Kuperman, B.A.1    Spafford, E.H.2
  • 14
    • 72149106875 scopus 로고    scopus 로고
    • Anomaly detection of computer usage using artificial intelligence techniques
    • Springer
    • J. H. Choy and S. B. Cho, "Anomaly detection of computer usage using artificial intelligence techniques, " Lecture Notes in Computer Scinece 2112 , pp. 31-43, Springer 2001.
    • (2001) Lecture Notes in Computer Scinece 2112 , pp. 31-43
    • Choy, J.H.1    Cho, S.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.