메뉴 건너뛰기




Volumn 15, Issue 4, 2008, Pages 24-33

Control theoretic approach to intrusion detection using a distributed hidden Markov model

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; FREQUENCY RESPONSE; HIDDEN MARKOV MODELS; MARKOV PROCESSES;

EID: 49749119545     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2008.4599218     Document Type: Article
Times cited : (22)

References (17)
  • 1
    • 33746368833 scopus 로고    scopus 로고
    • Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks
    • July
    • S. Ci et al., "Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks," IEEE Trans. Vehic. Tech., vol. 55, no. 4, July 2006, pp. 1302-10.
    • (2006) IEEE Trans. Vehic. Tech , vol.55 , Issue.4 , pp. 1302-1310
    • Ci, S.1
  • 2
    • 50949103638 scopus 로고    scopus 로고
    • X. Du et al., A Secure Routing Protocol for Heterogeneous Sensor Networks, Proc. IEEE GLOBECOM '06, San Francisco, CA, Nov. 2006.
    • X. Du et al., "A Secure Routing Protocol for Heterogeneous Sensor Networks," Proc. IEEE GLOBECOM '06, San Francisco, CA, Nov. 2006.
  • 3
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • Feb
    • L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, Feb. 1989, pp. 257-86.
    • (1989) Proc. IEEE , vol.77 , pp. 257-286
    • Rabiner, L.R.1
  • 4
    • 34247391599 scopus 로고    scopus 로고
    • System Approach to Intrusion Detection Using Hidden Markov Model
    • July
    • R. Khanna and H. Liu, "System Approach to Intrusion Detection Using Hidden Markov Model," Proc. 2006 Int'l. Conf. Commun, and Mobile Comp., July 2006, pp. 349-54.
    • (2006) Proc. 2006 Int'l. Conf. Commun, and Mobile Comp , pp. 349-354
    • Khanna, R.1    Liu, H.2
  • 5
    • 77953783421 scopus 로고    scopus 로고
    • Investigating Hidden Markov Models Capabilities in Anomaly Detection
    • Kennesaw, GA, Mar
    • S. S. Joshi and V. V. Phoha, "Investigating Hidden Markov Models Capabilities in Anomaly Detection," Proc. 43rd Annual Southeast Regional Conf.), Kennesaw, GA, Mar. 2005, pp. 98-103.
    • (2005) Proc. 43rd Annual Southeast Regional Conf.) , pp. 98-103
    • Joshi, S.S.1    Phoha, V.V.2
  • 6
    • 43949095092 scopus 로고    scopus 로고
    • Using Hidden Markov Models to Evaluate the Risks of Intrusions: System Architecture and Model Validation
    • Hamburg, Germany, Sept
    • A. Arnes et al., "Using Hidden Markov Models to Evaluate the Risks of Intrusions: System Architecture and Model Validation," Proc. Int'l. Symp. Recent Advances in Intrusion Detection, Hamburg, Germany, Sept. 2006.
    • (2006) Proc. Int'l. Symp. Recent Advances in Intrusion Detection
    • Arnes, A.1
  • 7
    • 84969506768 scopus 로고    scopus 로고
    • Applications of hidden Markov Models to Detecting Multi-stage Network Attacks
    • Jan
    • D. Ourston et al., "Applications of hidden Markov Models to Detecting Multi-stage Network Attacks," Proc. 36th Annual Hawaii Int'l. Conf. (Sys. Sci. '03), Jan. 2003.
    • (2003) Proc. 36th Annual Hawaii Int'l. Conf. (Sys. Sci. '03)
    • Ourston, D.1
  • 9
    • 35048846516 scopus 로고    scopus 로고
    • Behavioral Intrusion Detection
    • S. Zanero, "Behavioral Intrusion Detection," ISCIS '04, 2004.
    • (2004) ISCIS '04
    • Zanero, S.1
  • 12
    • 0030126609 scopus 로고    scopus 로고
    • Learning in the Presence of Concept Drifting and Hidden Contexts
    • G. Widmer and M. Kubat, "Learning in the Presence of Concept Drifting and Hidden Contexts," Machine Learning, vol. 23, 1996, pp. 69-101.
    • (1996) Machine Learning , vol.23 , pp. 69-101
    • Widmer, G.1    Kubat, M.2
  • 13
    • 12244286335 scopus 로고    scopus 로고
    • Systematic Data Selection to Mine Concept-Drifting Data Streams
    • W. Fan, "Systematic Data Selection to Mine Concept-Drifting Data Streams," ACM SIGKDD, 2004.
    • (2004) ACM SIGKDD
    • Fan, W.1
  • 16
    • 0030287048 scopus 로고    scopus 로고
    • The Expectation-Maximization Algorithm
    • Nov
    • T. K. Moon, "The Expectation-Maximization Algorithm," IEEE Signal Processing, Nov. 1996, pp. 47-59.
    • (1996) IEEE Signal Processing , pp. 47-59
    • Moon, T.K.1
  • 17
    • 0032639421 scopus 로고    scopus 로고
    • Detecting Intrusions Using System Calls: Alternative Data Models
    • Oakland, CA
    • C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models," IEEE Symp. Sec. and Privacy, Oakland, CA, 1999, pp. 133-45.
    • (1999) IEEE Symp. Sec. and Privacy , pp. 133-145
    • Warrender, C.1    Forrest, S.2    Pearlmutter, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.