메뉴 건너뛰기




Volumn 2, Issue , 2006, Pages 277-283

The architecture of host-based intrusion detection model generation system for the frequency per system call

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CLASSIFICATION (OF INFORMATION); DATA MINING; DECISION TREES; MATHEMATICAL MODELS;

EID: 34247271949     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICHIT.2006.253624     Document Type: Conference Paper
Times cited : (6)

References (18)
  • 2
    • 84885774862 scopus 로고    scopus 로고
    • A Framework For Constructing Features and Models For Intrusion Detection Systems
    • Lee, W., and Stolfo, S.J. 2000. A Framework For Constructing Features and Models For Intrusion Detection Systems. ACM Transactions on Information and System Security. 3(4):227-261.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 4
    • 33745463455 scopus 로고    scopus 로고
    • Learning Classifiers for Misuse and Anomaly Detection Using a Bag of Systems Calls Prepresentation
    • West Point, New York, June
    • D. K. Kang, D. Fuller, V. Honavar, "Learning Classifiers for Misuse and Anomaly Detection Using a Bag of Systems Calls Prepresentation," in Proc. of 6th IEEE Information Assurance Workshop, pp. 118-125, West Point, New York, June 2005.
    • (2005) Proc. of 6th IEEE Information Assurance Workshop , pp. 118-125
    • Kang, D.K.1    Fuller, D.2    Honavar, V.3
  • 6
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • 3123-24, pp, Dec
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, 31(23-24), pp. 2435-2463, Dec. 1999.
    • (1999) Computer Networks , pp. 2435-2463
    • Paxson, V.1
  • 10
    • 85029932967 scopus 로고    scopus 로고
    • J. Pei, S. Upadhyaya, F. Farooq, V. Govindaraju, Data Mining for Intrusion Detection: Techniques, Applications and Systems, In the 20th Int'l Conf. on Data Engineering, Boston, USA, Mar. 2004.
    • J. Pei, S. Upadhyaya, F. Farooq, V. Govindaraju, "Data Mining for Intrusion Detection: Techniques, Applications and Systems," In the 20th Int'l Conf. on Data Engineering, Boston, USA, Mar. 2004.
  • 11
    • 85029937957 scopus 로고    scopus 로고
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, in book Applications of Data Mining in Computer Security, Kluwer, (Eds. D. Barbara and S. Jajodia), 2002.
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in book Applications of Data Mining in Computer Security, Kluwer, (Eds. D. Barbara and S. Jajodia), 2002.
  • 13
    • 34249753618 scopus 로고
    • Support-Vector Networks
    • C. Cortes and V. Vapnik, "Support-Vector Networks," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.
    • (1995) Machine Learning , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 14
    • 0003120218 scopus 로고    scopus 로고
    • Fast Training of Support Vector Machines using Sequential Minimal Optimization
    • J. C. Platt, "Fast Training of Support Vector Machines using Sequential Minimal Optimization," Advances in Kernel Methods: Support Vector Learning, pp. 185-208, 1999.
    • (1999) Advances in Kernel Methods: Support Vector Learning , pp. 185-208
    • Platt, J.C.1
  • 16
    • 0025725905 scopus 로고
    • Instance-based Learning Algorithms
    • D. Aha, D. Kibler, "Instance-based Learning Algorithms, "Machine Learning, vol.6, pp. 37-66, 1991.
    • (1991) Machine Learning , vol.6 , pp. 37-66
    • Aha, D.1    Kibler, D.2
  • 17
    • 85029926370 scopus 로고    scopus 로고
    • University of New Mexico
    • University of New Mexico, "Computer Immune Systems Project," http://www.cs.unm.edu/~immsec/begin.html, 1997.
    • (1997) Computer Immune Systems Project


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.