메뉴 건너뛰기




Volumn , Issue , 2007, Pages 107-114

Host based intrusion detection using machine learning

Author keywords

Component; Malicious code detection; Worms

Indexed keywords

BINARY CODES; CLASSIFICATION (OF INFORMATION); COMPUTER WORMS; FEATURE EXTRACTION; LEARNING SYSTEMS;

EID: 34748915835     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/isi.2007.379542     Document Type: Conference Paper
Times cited : (22)

References (29)
  • 2
    • 34249865012 scopus 로고    scopus 로고
    • Research on intrusion detection and response: A survey
    • Kabiri, P., Ghorbani, A.A.. (2005) "Research on intrusion detection and response: A survey," International Journal of Network Security, vol. 1(2), pp. 84-102.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    Ghorbani, A.A.2
  • 4
    • 18844362133 scopus 로고    scopus 로고
    • Abou-Assaleh, T, Cercone, N, Keselj, V, and Sweidan, R, 2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference COMPSAC'04
    • Abou-Assaleh, T., Cercone, N., Keselj, V., and Sweidan, R. (2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04)
  • 5
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter, J.Z. and Maloof, M.A., Learning to detect and classify malicious executables in the wild, Journal Of Machine Learning Research, 7 (2006) 2721-2744.
    • (2006) Journal Of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 7
    • 17644421307 scopus 로고    scopus 로고
    • Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
    • Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
  • 9
    • 12244311689 scopus 로고    scopus 로고
    • Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
    • Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
  • 10
    • 34748904961 scopus 로고    scopus 로고
    • CERT. CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
    • CERT. CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
  • 11
    • 84940104123 scopus 로고    scopus 로고
    • Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
    • Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
  • 14
    • 2442526701 scopus 로고    scopus 로고
    • Ste. Zanero and Sergio M. Savaresi, Unsupervised learning techniques for an intrusion detection system, in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
    • Ste. Zanero and Sergio M. Savaresi, "Unsupervised learning techniques for an intrusion detection system," in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
  • 15
    • 17544388668 scopus 로고    scopus 로고
    • H. Gunes Kayacik, A. Nur Zincir-Heywood, and Malcolm I. Heywood, On the capability of a som based intrusion, detection system, in Proceedings of the International Joint Conference on Neural Networks, 3, pp. 1808-1813. IEEE, IEEE, July 2003.
    • H. Gunes Kayacik, A. Nur Zincir-Heywood, and Malcolm I. Heywood, On the capability of a som based intrusion, detection system, in Proceedings of the International Joint Conference on Neural Networks, vol. 3, pp. 1808-1813. IEEE, IEEE, July 2003.
  • 20
    • 0038103911 scopus 로고    scopus 로고
    • Utilising fuzzy logic and trend analysis for effective intrusion detection
    • M. Botha and R. von Solms, "Utilising fuzzy logic and trend analysis for effective intrusion detection," Computers & Security, vol. 22, no. 5, pp. 423-434, 2003.
    • (2003) Computers & Security , vol.22 , Issue.5 , pp. 423-434
    • Botha, M.1    von Solms, R.2
  • 21
    • 0003592399 scopus 로고    scopus 로고
    • The VTrace tool: Building a system tracer for Windows NT and Windows 2000
    • October
    • Lorch, J. and Smith, A. J. (2000) The VTrace tool: building a system tracer for Windows NT and Windows 2000. MSDN Magazine, 15(10):86-102, October 2000.
    • (2000) MSDN Magazine , vol.15 , Issue.10 , pp. 86-102
    • Lorch, J.1    Smith, A.J.2
  • 23
    • 34548731194 scopus 로고
    • C4.5; programs for machine learning
    • San Francisco, CA, USA
    • Quinlan, J.R. (1993). C4.5; programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
    • (1993) Morgan Kaufmann Publishers Inc
    • Quinlan, J.R.1
  • 25
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of simple Bayesian classifier under zero-one loss
    • Domingos, P., and Pazzani, M. (1997) On the optimality of simple Bayesian classifier under zero-one loss, Machine Learning, 29:103-130.
    • (1997) Machine Learning , vol.29 , pp. 103-130
    • Domingos, P.1    Pazzani, M.2
  • 26
    • 46149134436 scopus 로고
    • Fusion, propagation, and structuring in belief networks
    • Pearl J., (1986) Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3):241-288.
    • (1986) Artificial Intelligence , vol.29 , Issue.3 , pp. 241-288
    • Pearl, J.1
  • 28
    • 34748879703 scopus 로고    scopus 로고
    • Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
    • Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
  • 29
    • 85164392958 scopus 로고
    • A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
    • Kohavi, R., (1995) A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection, International Joint Conference in Artificial Intelligence, 1137-1145, 1995.
    • (1995) International Joint Conference in Artificial Intelligence , pp. 1137-1145
    • Kohavi, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.