메뉴 건너뛰기




Volumn 23, Issue 1, 2009, Pages 42-47

A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection

Author keywords

Data mining; Databases; Hidden Markov models; Intrusion detection; Probability density function; Security; Training

Indexed keywords

ANOMALY INTRUSION DETECTIONS; DATA PRE-PROCESSING; DATABASES; DETECTION PERFORMANCE; FALSE ALARM RATES; HMM TRAININGS; HOST-BASED; MAXIMUM GAINS; NETWORK IDS; NETWORK-BASED INTRUSION DETECTION SYSTEMS; PUBLIC DATABASE; RESEARCH ACTIVITIES; SECURITY; SPEED-UP; TRAINING; TRAINING TIME;

EID: 65249107163     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2009.4804323     Document Type: Article
Times cited : (156)

References (15)
  • 3
    • 21644438395 scopus 로고    scopus 로고
    • An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls
    • Singapore, Nov. 16-19
    • X. D. Hoang and J. Hu, "An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls," IEEE Int'l. Conf. Net. '04, Singapore, Nov. 16-19, 2004, vol. 2, pp. 470-74.
    • (2004) IEEE Int'l. Conf. Net. '04 , vol.2 , pp. 470-474
    • Hoang, X.D.1    Hu, J.2
  • 4
    • 84890861404 scopus 로고    scopus 로고
    • A Multi-Layer Model for Anomaly Intrusion Detection using Program Sequences of System Calls
    • Sydney, Australia, Sept. 28-Oct. 1
    • X. D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection using Program Sequences of System Calls," Proc. 11th IEEE Int'l. Conf. Net., Sydney, Australia, Sept. 28-Oct. 1, 2003, pp. 531-36.
    • (2003) Proc. 11th IEEE Int'l. Conf. Net , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 5
    • 34250315640 scopus 로고    scopus 로고
    • An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends
    • Aug
    • A. Patcha and J. Park, "An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends," Comp. Networks vol. 51, Aug. 2007, pp. 3448-70.
    • (2007) Comp. Networks , vol.51 , pp. 3448-3470
    • Patcha, A.1    Park, J.2
  • 7
    • 84885774862 scopus 로고    scopus 로고
    • A Framework for Constructing Features and Models for Intrusion Detection Systems
    • Nov
    • W. Lee and S. I. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Trans. Info. Sys. Sec. vol. 3, no. 4, Nov. 2000, pp. 227-61.
    • (2000) ACM Trans. Info. Sys. Sec , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.I.2
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection Using Sequences of System Calls
    • S. Forrest, S. A. Hofmeyr, and A. Somdyaji, "Intrusion Detection Using Sequences of System Calls." J. Comp. Sec., vol. 6, 1998, pp. 151-80.
    • (1998) J. Comp. Sec , vol.6 , pp. 151-180
    • Forrest, S.1    Hofmeyr, S.A.2    Somdyaji, A.3
  • 10
    • 34249319577 scopus 로고    scopus 로고
    • Intrusion Detection Based on Data Mining
    • Angers, France, Apr. 23-26
    • D. Hoang, J. Hu, and P. Bertok, "Intrusion Detection Based on Data Mining," 5th Int'l. Conf. Enterprise Info. Sys., Angers, France, vol. 3, Apr. 23-26, 2003, pp. 341-46.
    • (2003) 5th Int'l. Conf. Enterprise Info. Sys , vol.3 , pp. 341-346
    • Hoang, D.1    Hu, J.2    Bertok, P.3
  • 11
    • 65249088930 scopus 로고    scopus 로고
    • Efficient Training for HMM-based Anomaly Detection System Using Correlation Method,
    • Honors Thesis, RMIT University
    • D. Qiu, "Efficient Training for HMM-based Anomaly Detection System Using Correlation Method," Honors Thesis, RMIT University, 2008.
    • (2008)
    • Qiu, D.1
  • 12
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, 1989, pp 257-86.
    • (1989) Proc. IEEE , vol.77 , pp. 257-286
    • Rabiner, L.R.1
  • 13
    • 33751579019 scopus 로고    scopus 로고
    • Improved Estimation of Hidden Markov Model Parameters from Multiple Observation Sequences
    • R. I. A. Davis, B. C. Lovell, and T. Caelli, "Improved Estimation of Hidden Markov Model Parameters from Multiple Observation Sequences" Proc. 16th Int'l. Conf. Pattern Recognition, vol. 2, 2002, pp. 168-71.
    • (2002) Proc. 16th Int'l. Conf. Pattern Recognition , vol.2 , pp. 168-171
    • Davis, R.I.A.1    Lovell, B.C.2    Caelli, T.3
  • 14
    • 0032205799 scopus 로고    scopus 로고
    • Efficient Training Algorithm for HMM's Using Incremental Estimation
    • Y. Gotoh, M. M. Hochberg, and H. F. Silverman," Efficient Training Algorithm for HMM's Using Incremental Estimation," Speech Audio Processing, vol. 6, no. 6, 1998, pp. 539-48.
    • (1998) Speech Audio Processing , vol.6 , Issue.6 , pp. 539-548
    • Gotoh, Y.1    Hochberg, M.M.2    Silverman, H.F.3
  • 15
    • 65249117593 scopus 로고    scopus 로고
    • University of New Mexico's Computer Systems Project, Oct. 24
    • University of New Mexico's Computer Systems Project, Oct. 24, 2008; http://www.cs.unm.edu/immsec/systemcalls.htm
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.