메뉴 건너뛰기




Volumn 52, Issue 8, 2008, Pages 4116-4131

Sequence alignment for masquerade detection

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BIOINFORMATICS; INFORMATION SYSTEMS; USER INTERFACES;

EID: 41249096616     PISSN: 01679473     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csda.2008.01.022     Document Type: Article
Times cited : (56)

References (24)
  • 4
    • 84944736505 scopus 로고    scopus 로고
    • Coull, S., Branch, J., Szymanski, B., Breimer, E., 2003. Intrusion detection: A bioinformatics approach. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 24-33
    • Coull, S., Branch, J., Szymanski, B., Breimer, E., 2003. Intrusion detection: A bioinformatics approach. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 24-33
  • 6
    • 41249084750 scopus 로고    scopus 로고
    • Lane, T., Brodley, C.E., 1997. Sequence matching and learning in anomaly detection for computer security. In: Proceedings of the AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management, vol. 49, pp. 43-49
    • Lane, T., Brodley, C.E., 1997. Sequence matching and learning in anomaly detection for computer security. In: Proceedings of the AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management, vol. 49, pp. 43-49
  • 7
    • 41249102803 scopus 로고    scopus 로고
    • Lane, T., Brodley, C.E., 1998. Approaches to online learning and concept drift for user identification in computer security. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, pp. 259-263
    • Lane, T., Brodley, C.E., 1998. Approaches to online learning and concept drift for user identification in computer security. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, pp. 259-263
  • 9
    • 1542378274 scopus 로고    scopus 로고
    • Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 5-14
    • Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 5-14
  • 10
    • 0036931591 scopus 로고    scopus 로고
    • Maxion, R.A., Townsend, T.N., 2002. Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 219-228
    • Maxion, R.A., Townsend, T.N., 2002. Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 219-228
  • 11
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarity in the amino acid sequence of two proteins
    • Needleman S.B., and Wunsch C.D. A general method applicable to the search for similarity in the amino acid sequence of two proteins. Journal of Molecular Biology 48 (1970) 443-453
    • (1970) Journal of Molecular Biology , vol.48 , pp. 443-453
    • Needleman, S.B.1    Wunsch, C.D.2
  • 14
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters 76 1 (2000) 33-38
    • (2000) Information Processing Letters , vol.76 , Issue.1 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 15
    • 0019887799 scopus 로고
    • Identification of common molecular subsequences
    • Smith T.F., and Waterman M.S. Identification of common molecular subsequences. Journal of Molecular Biology 147 (1981) 195-197
    • (1981) Journal of Molecular Biology , vol.147 , pp. 195-197
    • Smith, T.F.1    Waterman, M.S.2
  • 16
    • 15944400613 scopus 로고    scopus 로고
    • Szymanski, B.K., Zhang, Y., 2004. Recursive data mining for masquerade detection and author identification. In: Proceedings of the 5th Annual IEEE System, Man, and Cybernetics Information Assurance Workshop, pp. 424-431
    • Szymanski, B.K., Zhang, Y., 2004. Recursive data mining for masquerade detection and author identification. In: Proceedings of the 5th Annual IEEE System, Man, and Cybernetics Information Assurance Workshop, pp. 424-431
  • 17
    • 20444456754 scopus 로고    scopus 로고
    • Tandon, G., Chan, P., Mitra, D., 2004. MORPHEUS: Motif oriented representations to purge hostile events from unlabeled sequences. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 16-25
    • Tandon, G., Chan, P., Mitra, D., 2004. MORPHEUS: Motif oriented representations to purge hostile events from unlabeled sequences. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 16-25
  • 18
    • 0038011184 scopus 로고    scopus 로고
    • Wagner, D., Soto, P., 2002. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255-264
    • Wagner, D., Soto, P., 2002. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255-264
  • 19
    • 0015960104 scopus 로고
    • The string-to-string correction problem
    • Wagner R.A., and Fischer M.J. The string-to-string correction problem. Journal of the ACM 21 1 (1974) 168-173
    • (1974) Journal of the ACM , vol.21 , Issue.1 , pp. 168-173
    • Wagner, R.A.1    Fischer, M.J.2
  • 20
    • 41249098422 scopus 로고    scopus 로고
    • Wang, K., Stolfo, S.J., 2003. One-class training for masquerade detection. In: Proceedings of the 3rd IEEE International Conference on Data Mining Workshop on Data Mining for Security Applications
    • Wang, K., Stolfo, S.J., 2003. One-class training for masquerade detection. In: Proceedings of the 3rd IEEE International Conference on Data Mining Workshop on Data Mining for Security Applications
  • 21
    • 41249084504 scopus 로고    scopus 로고
    • Wespi, A., Dacier, M., Debar, H., 1999. An intrusion-detection system based on the teiresias pattern-discovery algorithm. In: EICAR 1999 Best Paper Proceedings, pp. 1-15
    • Wespi, A., Dacier, M., Debar, H., 1999. An intrusion-detection system based on the teiresias pattern-discovery algorithm. In: EICAR 1999 Best Paper Proceedings, pp. 1-15
  • 22
    • 20444441611 scopus 로고    scopus 로고
    • Wright, C., Monrose, F., Masson, G.M., 2004. HMM profiles for network traffic classification. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9-15
    • Wright, C., Monrose, F., Masson, G.M., 2004. HMM profiles for network traffic classification. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9-15
  • 23
    • 33845735523 scopus 로고    scopus 로고
    • On inferring application protocol behaviors in encrypted network traffic
    • Wright C.V., Monrose F., and Masson G.M. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research 7 (2006) 2745-2769
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2745-2769
    • Wright, C.V.1    Monrose, F.2    Masson, G.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.