메뉴 건너뛰기




Volumn 3644, Issue PART I, 2005, Pages 995-1003

A reinforcement learning approach for host-based intrusion detection using sequences of system calls

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER SCIENCE; COMPUTER VISION; DATA MINING; INFORMATION TECHNOLOGY; LEARNING ALGORITHMS; MARKOV PROCESSES; MATHEMATICAL MODELS; OPTIMIZATION; SECURITY OF DATA; COMPUTATIONAL EFFICIENCY; INTELLIGENT COMPUTING; LEARNING SYSTEMS; NETWORK SECURITY; REINFORCEMENT LEARNING;

EID: 27144512114     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11538059_103     Document Type: Conference Paper
Times cited : (42)

References (12)
  • 2
    • 0032676506 scopus 로고    scopus 로고
    • A Data mining framework for building intrusion detection model
    • Gong L., Reiter M.K. (eds.): Oakland, CA: IEEE Computer Society Press
    • Lee W.K., Stolfo S.J.: A Data Mining Framework for Building Intrusion Detection Model. In: Gong L., Reiter M.K. (eds.): Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press (1999) 120-132
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.K.1    Stolfo, S.J.2
  • 5
  • 7
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • Gong L., Reiter M.K. (eds.): Oakland, CA: IEEE Computer Society Press
    • Warrender C., Forresr S., Pearlmutter B.: Detecting Intrusions using System Calls: Alternative Data Models. In: Gong L., Reiter M.K. (eds.): Proceedings of the 1999 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press (1999) 133-145
    • (1999) Proceedings of the 1999 IEEE Symposium on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forresr, S.2    Pearlmutter, B.3
  • 9
    • 33847202724 scopus 로고
    • Learning to predict by the method of temporal differences
    • Sutton R.: Learning to Predict by the Method of Temporal Differences. Machine Learning, 3(1), (1988) 9-44
    • (1988) Machine Learning , vol.3 , Issue.1 , pp. 9-44
    • Sutton, R.1
  • 11
    • 11244287524 scopus 로고    scopus 로고
    • An intrusion detection system based on support vector machine
    • Rao X., Dong C.X., Yang S.Q.: An Intrusion Detection System based on Support Vector Machine. Journal of Software, 14(4) (2003) 798-803
    • (2003) Journal of Software , vol.14 , Issue.4 , pp. 798-803
    • Rao, X.1    Dong, C.X.2    Yang, S.Q.3
  • 12
    • 0041345290 scopus 로고    scopus 로고
    • Efficient reinforcement learning using recursive least-squares methods
    • Xu X., He H.G., Hu D.W.: Efficient Reinforcement Learning Using Recursive Least-Squares Methods. Journal of Artificial Intelligence Research, 16, (2002) 259-292
    • (2002) Journal of Artificial Intelligence Research , vol.16 , pp. 259-292
    • Xu, X.1    He, H.G.2    Hu, D.W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.