메뉴 건너뛰기




Volumn 3488 LNAI, Issue , 2005, Pages 14-28

Anomaly detection in computer security and an application to file system accesses

Author keywords

Anomaly Detection; File System; Host Based Intrusion Detection; Wrapping

Indexed keywords

FILE ORGANIZATION; LEARNING SYSTEMS; MATHEMATICAL MODELS; PROBABILITY; REAL TIME SYSTEMS;

EID: 26944448557     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11425274_2     Document Type: Conference Paper
Times cited : (28)

References (25)
  • 9
    • 0004118981 scopus 로고
    • The NIDES statistical component: Description and justification
    • SRI International
    • H. S. Javitz and A. Valdes. The NIDES Statistical Component: Description and Justification. Technical report. SRI International, 1993.
    • (1993) Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 17
    • 84880858814 scopus 로고    scopus 로고
    • Maxion. Why 6? defining the operational limits of stide, an anomaly-based intrusion detector
    • K M.C. Tan and Roy A. Maxion. Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector. IEEE Symp. On Security and Privacy. 2002.
    • (2002) IEEE Symp. on Security and Privacy
    • Tan, K.M.C.1    Roy, A.2
  • 21
    • 36048968577 scopus 로고    scopus 로고
    • One-class training for masquerade detection
    • 3rd IEEE International Conference on Data Mining, Florida, Nov.
    • K. Wang and S. Stolfo. One-Class Training for Masquerade Detection. 3rd IEEE International Conference on Data Mining, Workshop on Data Mining for Security Applications, Florida, Nov., 2003.
    • (2003) Workshop on Data Mining for Security Applications
    • Wang, K.1    Stolfo, S.2
  • 22
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • France, September
    • K. Wang, S. J. Stolfo. Anomalous Payload-based Network Intrusion Detection. RAID2004, France, September 2004.
    • (2004) RAID2004
    • Wang, K.1    Stolfo, S.J.2
  • 24
    • 0003201842 scopus 로고    scopus 로고
    • A Markov Chain model of temporal behavior for anomaly detection
    • United States Military Academy, West Point, NY
    • N. Ye. A Markov Chain Model of Temporal Behavior for Anomaly Detection. In Proceedings of the 2000 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY. 2000.
    • (2000) Proceedings of the 2000 IEEE Workshop on Information Assurance and Security
    • Ye, N.1
  • 25


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.