메뉴 건너뛰기




Volumn 4571 LNAI, Issue , 2007, Pages 449-463

Sensing attacks in computers networks with hidden Markov models

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER OPERATING SYSTEMS; DATA STRUCTURES; HIDDEN MARKOV MODELS;

EID: 37349085065     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73499-4_34     Document Type: Conference Paper
Times cited : (16)

References (26)
  • 1
    • 84990186442 scopus 로고    scopus 로고
    • The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
    • Axelsson, S.: The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection. In: Proc. of RAID (May 1999)
    • (1999) Proc. of RAID (May
    • Axelsson, S.1
  • 2
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • Baum, L.E., Petrie, T., Soules, G., Weiss, N.: A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann. Math. Statist. 41(1), 164-171 (1970)
    • (1970) Ann. Math. Statist , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.E.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 3
    • 8344243818 scopus 로고    scopus 로고
    • Bicego, M., Murino, V., Figueiredo, M.: Similarity-Based Clustering of Sequences Using Hidden Markov Models. In: Perner, P., Rosenfeld, A. (eds.) MLDM 2003. LNCS, 2734, pp. 86-95. Springer, Heidelberg (2003)
    • Bicego, M., Murino, V., Figueiredo, M.: Similarity-Based Clustering of Sequences Using Hidden Markov Models. In: Perner, P., Rosenfeld, A. (eds.) MLDM 2003. LNCS, vol. 2734, pp. 86-95. Springer, Heidelberg (2003)
  • 4
    • 21144432658 scopus 로고    scopus 로고
    • Cho, S., Han, S.: Two sophisticated techniques to improve HMM-based intrusion detection systems. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 207-219. Springer, Heidelberg (2003)
    • Cho, S., Han, S.: Two sophisticated techniques to improve HMM-based intrusion detection systems. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 207-219. Springer, Heidelberg (2003)
  • 6
    • 0023294428 scopus 로고
    • An Intrusion Detection Model
    • Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Software Eng. SE13(2), 222-232 (1987)
    • (1987) IEEE Trans. Software Eng , vol.SE13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 7
    • 84957007442 scopus 로고    scopus 로고
    • Dietrich, C., Schwenker, F., Palm, G.: Classification of Time Series Utilizing Temporal and Decision Fusion. In: Kittler, J., Roli, F. (eds.) MCS 2001. LNCS, 2096, pp. 378-387. Springer, Heidelberg (2001)
    • Dietrich, C., Schwenker, F., Palm, G.: Classification of Time Series Utilizing Temporal and Decision Fusion. In: Kittler, J., Roli, F. (eds.) MCS 2001. LNCS, vol. 2096, pp. 378-387. Springer, Heidelberg (2001)
  • 8
    • 80053403826 scopus 로고    scopus 로고
    • Dietterich, T.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, 1857, pp. 1-15. Springer, Heidelberg (2000)
    • Dietterich, T.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1-15. Springer, Heidelberg (2000)
  • 11
    • 0141651792 scopus 로고    scopus 로고
    • The prediction role of Hidden Markov Model in Intrusion Detection
    • May
    • Gao, F., Sun, J., Wei, Z.: The prediction role of Hidden Markov Model in Intrusion Detection. In: Proc. of IEEE CCECE 2003, vol. 2, pp. 893-896 (May 2003)
    • (2003) Proc. of IEEE CCECE , vol.2 , pp. 893-896
    • Gao, F.1    Sun, J.2    Wei, Z.3
  • 12
    • 33750379862 scopus 로고    scopus 로고
    • Gao, D., Reiter, M., Song, D.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 19-40. Springer, Heidelberg (2006)
    • Gao, D., Reiter, M., Song, D.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
  • 13
    • 0038330235 scopus 로고    scopus 로고
    • Fusion of multiple classifiers for intrusion in computer networks
    • Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion in computer networks. Pattern Recognition Letters 24(12), 1795-1803 (2003)
    • (2003) Pattern Recognition Letters , vol.24 , Issue.12 , pp. 1795-1803
    • Giacinto, G.1    Roli, F.2    Didaci, L.3
  • 14
    • 37349091044 scopus 로고    scopus 로고
    • Hashem, M.: Network Based Hidden Markov Models Intrusion Detection Systems. IJICIS, 6(1) (2006)
    • Hashem, M.: Network Based Hidden Markov Models Intrusion Detection Systems. IJICIS, 6(1) (2006)
  • 15
    • 21644438395 scopus 로고    scopus 로고
    • An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls
    • Hoang, X.D., Hu, J.: An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls. In: Proc. of 12th IEEE Conference on Networks, 2004, vol. 2, pp. 470-474 (2004)
    • (2004) Proc. of 12th IEEE Conference on Networks , vol.2 , pp. 470-474
    • Hoang, X.D.1    Hu, J.2
  • 16
    • 0034830461 scopus 로고    scopus 로고
    • Decision Templates for Multiple Classifier Fusion
    • Kuncheva, L., Bezdek, J.C., Duin, R.P.W.: Decision Templates for Multiple Classifier Fusion. Pattern Recognition 34(2), 299-314 (2001)
    • (2001) Pattern Recognition , vol.34 , Issue.2 , pp. 299-314
    • Kuncheva, L.1    Bezdek, J.C.2    Duin, R.P.W.3
  • 18
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of Intrusion Detection Systems
    • September/October
    • Mc Hugh, J., Christie, A., Allen, J.: Defending yourself: The role of Intrusion Detection Systems. IEEE Software 42-51 (September/October 2000)
    • (2000) IEEE Software , vol.42-51
    • Mc Hugh, J.1    Christie, A.2    Allen, J.3
  • 21
    • 0037142572 scopus 로고    scopus 로고
    • Anomaly Intrusion Detection Method Based on HMM
    • June
    • Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronic Letters 38(13) (June 2002)
    • (2002) Electronic Letters , vol.38 , Issue.13
    • Qiao, Y.1    Xin, X.W.2    Bin, Y.3    Ge, S.4
  • 22
    • 0024610919 scopus 로고
    • A tutorial on Hidden Markov Models and selected applications in speech recognition
    • February
    • Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. In: Proc. of IEEE vol. 77(2), pp. 257-286 (February 1989)
    • (1989) Proc. of IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 26


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.