메뉴 건너뛰기




Volumn 4430 LNCS, Issue , 2007, Pages 152-159

Research on hidden Markov model for system call anomaly detection

Author keywords

Anomaly detection; Hidden markov model; Host system calls

Indexed keywords

DATA COMMUNICATION SYSTEMS; HIDDEN MARKOV MODELS; INFORMATION SYSTEMS; REAL TIME CONTROL;

EID: 38049136994     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-71549-8_13     Document Type: Conference Paper
Times cited : (13)

References (12)
  • 1
    • 38049161631 scopus 로고    scopus 로고
    • R. Anderson, A. Khattak. The use of information retrieval techniques for intrusion detection [EB/OL]. http://www.raid-symposium.org/raid98/index.html, 2004-10-04.
    • R. Anderson, A. Khattak. The use of information retrieval techniques for intrusion detection [EB/OL]. http://www.raid-symposium.org/raid98/index.html, 2004-10-04.
  • 2
    • 0002979739 scopus 로고    scopus 로고
    • Hidden markov models for human/computer interface modeling[A]
    • Stockholm, Sweden: Morgan Kaufmann Publishers
    • Terran L. Hidden markov models for human/computer interface modeling[A]. Proceedings of the IJCAI-99 Workshop on Learning about Users[C]. Stockholm, Sweden: Morgan Kaufmann Publishers, 1999. 35-44.
    • (1999) Proceedings of the IJCAI-99 Workshop on Learning about Users[C] , pp. 35-44
    • Terran, L.1
  • 4
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows using hidden Markov model[J]
    • Sung B C, Hyuk J P. Efficient anomaly detection by modeling privilege flows using hidden Markov model[J]. Computers & Security, 2003, 22(1):45-55.
    • (2003) Computers & Security , vol.22 , Issue.1 , pp. 45-55
    • Sung, B.C.1    Hyuk, J.P.2
  • 6
  • 9
    • 84880174811 scopus 로고    scopus 로고
    • Detecting intrusions using system calls: Alternative data models[A]
    • Oakland, California: IEEE Computer Society Press
    • Christina W, Stephanie F, Barak P. Detecting intrusions using system calls: alternative data models[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California: IEEE Computer Society Press, 1999.133-145.
    • (1999) Proceedings of IEEE Symposium on Security and Privacy[C] , pp. 133-145
    • Christina, W.1    Stephanie, F.2    Barak, P.3
  • 10
    • 38049168877 scopus 로고    scopus 로고
    • D.Snyder. On-line intrusion detection using sequences of system calls[D]. Master's thesis, Department of Computer Science, Florida State University, 2001.
    • D.Snyder. On-line intrusion detection using sequences of system calls[D]. Master's thesis, Department of Computer Science, Florida State University, 2001.
  • 11
    • 38049161632 scopus 로고    scopus 로고
    • Jinhui-xie. HMM and its application in speech recognition[M] (in Chinese). Wuhan : Huazhong University of Technology Press, 1995.
    • Jinhui-xie. HMM and its application in speech recognition[M] (in Chinese). Wuhan : Huazhong University of Technology Press, 1995.
  • 12
    • 38049138563 scopus 로고    scopus 로고
    • Computer Immune Systems Data Sets. University of New Mexico[EB/OL], http://www.cs.unm.edu/~immsec/data/synth-sm.html, 2004-9-10.
    • Computer Immune Systems Data Sets. University of New Mexico[EB/OL], http://www.cs.unm.edu/~immsec/data/synth-sm.html, 2004-9-10.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.