메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 118-125

Learning classifiers for misuse and anomaly detection using a bag of system calls representation

Author keywords

[No Author keywords available]

Indexed keywords

CALLS REPRESENTATION; INTRUSION DETECTION; LEARNING CLASSIFIERS; MACHINE LEARNING TECHNIQUES;

EID: 33745463455     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2005.1495942     Document Type: Conference Paper
Times cited : (117)

References (25)
  • 1
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. Softw. Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 2
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Chalmers Univ., Mar.
    • S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Tech. Rep. 99-15, Chalmers Univ., Mar. 2000.
    • (2000) Tech. Rep. , vol.99 , Issue.15
    • Axelsson, S.1
  • 3
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • Washington, D.C.
    • A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection," in 8th USENIX Security Symposium, (Washington, D.C.), pp. 141-151, 1999.
    • (1999) 8th USENIX Security Symposium , pp. 141-151
    • Ghosh, A.1    Schwartzbard, A.2
  • 4
    • 0028430224 scopus 로고
    • Network intrusion detection
    • B. Mukherjee, H. Heberlein, and K. Levitt, "Network intrusion detection," IEEE Network, vol. 8, no. 3, pp. 26-41, 1994.
    • (1994) IEEE Network , vol.8 , Issue.3 , pp. 26-41
    • Mukherjee, B.1    Heberlein, H.2    Levitt, K.3
  • 9
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 12
    • 85149612939 scopus 로고
    • Fast effective rule induction
    • (A. Prieditis and S. Russell, eds.), (Tahoe City, CA), Morgan Kaufmann, July 9-12
    • W. W. Cohen, "Fast effective rule induction," in Proc. of the ISth International Conference on Machine Learning (A. Prieditis and S. Russell, eds.), (Tahoe City, CA), pp. 115-123, Morgan Kaufmann, July 9-12, 1995.
    • (1995) Proc. of the ISth International Conference on Machine Learning , pp. 115-123
    • Cohen, W.W.1
  • 13
    • 34249753618 scopus 로고
    • Support-vector networks
    • C. Cortes and V. Vapnik, "Support-vector networks," Mach. Learn., vol. 20, no. 3, pp. 273-297, 1995.
    • (1995) Mach. Learn. , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 14
    • 0003120218 scopus 로고    scopus 로고
    • Fast training of support vector machines using sequential minimal optimization
    • J. C. Platt, "Fast training of support vector machines using sequential minimal optimization," Advances in kernel methods: support vector learning, pp. 185-208, 1999.
    • (1999) Advances in Kernel Methods: Support Vector Learning , pp. 185-208
    • Platt, J.C.1
  • 15
    • 0000521473 scopus 로고
    • Ridge estimators in logistic regression
    • S. L. Cessie and J. V. Houwelingen, "Ridge estimators in logistic regression," Applied Statistics, vol. 41, no. 1, pp. 191-201, 1992.
    • (1992) Applied Statistics , vol.41 , Issue.1 , pp. 191-201
    • Cessie, S.L.1    Houwelingen, J.V.2
  • 19
    • 0036085540 scopus 로고    scopus 로고
    • "Why 6?" defining the operational limits of stide, an anomaly-based intrusion detector
    • IEEE Computer Society
    • K. M. C. Tan and R. A. Maxion, ""Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector," in Proceedings of the 2002 IEEE Symposium an Security and Privacy, p. 188, IEEE Computer Society, 2002.
    • (2002) Proceedings of the 2002 IEEE Symposium An Security and Privacy , pp. 188
    • Tan, K.M.C.1    Maxion, R.A.2
  • 21
    • 0001927585 scopus 로고
    • On information and sufficiency
    • S. Kullback and R. A. Leiblei, "On information and sufficiency," Ann. Math. Statist., vol. 22, pp. 79-86, 1951.
    • (1951) Ann. Math. Statist. , vol.22 , pp. 79-86
    • Kullback, S.1    Leiblei, R.A.2
  • 24
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)
    • Computer Science Laboratory, SRI International, Menlo Park, CA, May
    • D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)," Tech. Rep. SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1995.
    • (1995) Tech. Rep. , vol.SRI-CSL-95-06
    • Anderson, D.1    Lunt, T.F.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.