메뉴 건너뛰기




Volumn 44, Issue 9, 2007, Pages 1538-1544

Anomaly detection of program behaviors based on system calls and homogeneous Markov chain models

Author keywords

Anomaly detection; Intrusion detection; Markov chain; Program behavior; System call

Indexed keywords

COMPUTATIONAL EFFICIENCY; COMPUTER SOFTWARE; HIDDEN MARKOV MODELS; MARKOV PROCESSES; NETWORK SECURITY; SECURITY OF DATA;

EID: 34948901907     PISSN: 10001239     EISSN: None     Source Type: Journal    
DOI: 10.1360/crad20070912     Document Type: Article
Times cited : (13)

References (15)
  • 1
    • 0037400054 scopus 로고    scopus 로고
    • An empirical study of two approaches to sequence learning for anomaly detection
    • T Lane, E B Carla. An empirical study of two approaches to sequence learning for anomaly detection [J]. Machine Learning, 2003, 51 (1): 73-107
    • (2003) Machine Learning , vol.51 , Issue.1 , pp. 73-107
    • Lane, T.1    Carla, E.B.2
  • 2
    • 14844301453 scopus 로고    scopus 로고
    • Robustness of the Markov chain model for cyber attack detection
    • N Ye, Y Zhang, C M Borror. Robustness of the Markov chain model for cyber attack detection [J]. IEEE Trans on Reliability, 2003, 52 (3): 122-138
    • (2003) IEEE Trans on Reliability , vol.52 , Issue.3 , pp. 122-138
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 3
    • 0013425679 scopus 로고    scopus 로고
    • Machine learning techniques for the computer security domain of anomaly detection: [Ph D dissertation]
    • Purdue: Purdue University
    • T Lane. Machine learning techniques for the computer security domain of anomaly detection: [Ph D dissertation] [D]. Purdue: Purdue University, 2000
    • (2000)
    • Lane, T.1
  • 4
    • 0032639421 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models
    • Los Alamitos, CA: IEEE Computer Society Press
    • C Warrender, S Forrest, B Pearlmutter. Detecting intrusions using system calls: Alternative data models [C]. In: Proc of the 1999 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1999. 133-145
    • (1999) Proc of the 1999 IEEE Symp on Security and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3
  • 5
    • 0037142572 scopus 로고    scopus 로고
    • An anomaly intrusion detection method based on HMM
    • Yan Qiao, Xie Weixin, Yang Bin, et al. An anomaly intrusion detection method based on HMM [J]. Electronics Letters, 2002, 38 (13): 663-664
    • (2002) Electronics Letters , vol.38 , Issue.13 , pp. 663-664
    • Yan, Q.1    Xie, W.2    Yang, B.3
  • 9
    • 70350556318 scopus 로고    scopus 로고
    • Two sophisticated techniques to improve HMM-based intrusion detection systems
    • Pittsburgh, USA
    • S Cho, S Han. Two sophisticated techniques to improve HMM-based intrusion detection systems [J]. Int'l Symp on Recent Advances in Intrusion Detection, Pittsburgh, USA, 2003
    • (2003) Int'l Symp on Recent Advances in Intrusion Detection
    • Cho, S.1    Han, S.2
  • 10
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Los Alamitos, CA: IEEE Computer Society Press
    • W Lee, X Dong. Information-theoretic measures for anomaly detection [C]. In: Proc of the 2001 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 2001. 130-134
    • (2001) Proc of the 2001 IEEE Symp on Security and Privacy , pp. 130-134
    • Lee, W.1    Dong, X.2
  • 11
    • 34249990673 scopus 로고    scopus 로고
    • Anomaly detection methods for host-based intrusion detection systems: [Ph D dissertation]
    • Changsha: National University of Defense Technology, in Chinese
    • Tian Xinguang. Anomaly detection methods for host-based intrusion detection systems: [Ph D dissertation] [D]. Changsha: National University of Defense Technology, 2005 (in Chinese)
    • (2005)
    • Tian, X.1
  • 12
    • 17644369553 scopus 로고    scopus 로고
    • Network intrusion detection based on support vector machine
    • in Chinese
    • Li Hui, Guan Xiaohong, Zan Xin, et al. Network intrusion detection based on support vector machine [J]. Journal of Computer Research and Development, 2003, 40 (6): 799-807 (in Chinese)
    • (2003) Journal of Computer Research and Development , vol.40 , Issue.6 , pp. 799-807
    • Li, H.1    Guan, X.2    Zan, X.3
  • 13
    • 0037105910 scopus 로고    scopus 로고
    • Intrusion detection techniques and approaches
    • T Verwoerd, R Hunt. Intrusion detection techniques and approaches [J]. Computer Communication, 2002, 25 (15): 1356-1365
    • (2002) Computer Communication , vol.25 , Issue.15 , pp. 1356-1365
    • Verwoerd, T.1    Hunt, R.2
  • 14
    • 33749860521 scopus 로고    scopus 로고
    • Intrusion detection method based on machine learning
    • in Chinese
    • Tian Xinguang, Gao Lizhi, Zhang Eryang. Intrusion detection method based on machine learning [J]. Journal on Communications, 2006, 27 (6): 108-114 (in Chinese)
    • (2006) Journal on Communications , vol.27 , Issue.6 , pp. 108-114
    • Tian, X.1    Gao, L.2    Zhang, E.3
  • 15
    • 1542362262 scopus 로고    scopus 로고
    • An improved anomaly detection model for IDS
    • in Chinese
    • Sun Hongwei, Tian Xinguang, Li Xuechun, et al. An improved anomaly detection model for IDS [J]. Chinese Journal of Computers, 2003, 26 (11): 1450-1455 (in Chinese)
    • (2003) Chinese Journal of Computers , vol.26 , Issue.11 , pp. 1450-1455
    • Sun, H.1    Tian, X.2    Li, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.