메뉴 건너뛰기




Volumn 2, Issue 6, 2007, Pages 42-52

Learning problem and BCJR decoding algorithm in anomaly-based intrusion detection systems

Author keywords

Anomaly based intrusion detection; BCJR decoding algorithm; Hidden Markov Model; Intrusion detection; Learning problem

Indexed keywords

COMPUTER CRIME; DECODING; HIDDEN MARKOV MODELS; LEARNING ALGORITHMS;

EID: 70349350844     PISSN: 1796217X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jsw.2.6.42-52     Document Type: Article
Times cited : (3)

References (37)
  • 1
    • 84899303295 scopus 로고    scopus 로고
    • Distributed Intrusion Detection Systems: A Computational Intelligence Approach
    • Idea Group Inc. Publishers, USA, Chapter 5
    • Abraham, A., Thomas, J., Distributed Intrusion Detection Systems: A Computational Intelligence Approach, Applications of Information Systems to Homeland Security and Defense, Idea Group Inc. Publishers, USA, Chapter 5, pp. 105-135, 2005.
    • (2005) Applications of Information Systems to Homeland Security and Defense , pp. 105-135
    • Abraham, A.1    Thomas, J.2
  • 4
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • June
    • Chebrolu, S.; Abraham A.; Thomas, J. P., Feature deduction and ensemble design of intrusion detection systems, Computers & Security, Volume 24, Issue 4, 1 June 2005, pp. 295-307.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, S.1    Abraham, A.2    Thomas, J.P.3
  • 7
    • 33947572261 scopus 로고    scopus 로고
    • Learning vector quantization neural network method for network intrusion detection
    • ISSN 1007-1202
    • Degang Y., C. Guo, W. Hui, L. Xiaofeng, Learning vector quantization neural network method for network intrusion detection, Wuhan University Journal of Natural Sciences, Volume 12, Number 1, 2007, ISSN 1007-1202, pp. 147-150.
    • (2007) Wuhan University Journal of Natural Sciences , vol.12 , Issue.1 , pp. 147-150
    • Degang, Y.1    Guo, C.2    Hui, W.3    Xiaofeng, L.4
  • 13
    • 27644509266 scopus 로고    scopus 로고
    • Intrusion Detection Systems and Intrusion Prevention Systems
    • Fuchsberger A., Intrusion Detection Systems and Intrusion Prevention Systems, Information Security Technical Report, Volume 10, Issue 3, 2005, pp. 134-139.
    • (2005) Information Security Technical Report , vol.10 , Issue.3 , pp. 134-139
    • Fuchsberger, A.1
  • 18
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • Jin S., D. S. Yeung, X. Wang, Network intrusion detection in covariance feature space, Pattern Recognition, Volume 40, Issue 8, 2007, pp. 2185-2197.
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2185-2197
    • Jin, S.1    Yeung, D.S.2    Wang, X.3
  • 19
    • 34248169333 scopus 로고    scopus 로고
    • Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
    • ISSN: 0020-0255
    • Katos V., Network intrusion detection: Evaluating cluster, discriminant, and logit analysis, Information Sciences, Volume 177, Issue 15, 2007, ISSN: 0020-0255, pp. 3060-3073.
    • (2007) Information Sciences , vol.177 , Issue.15 , pp. 3060-3073
    • Katos, V.1
  • 20
    • 20344365833 scopus 로고    scopus 로고
    • For whom the bells toll: Effective IDS deployment strategies
    • May
    • Kemp M., For whom the bells toll: effective IDS deployment strategies, Network Security, Volume 2005, Issue 5, May 2005, pp. 16-18.
    • (2005) Network Security , vol.2005 , Issue.5 , pp. 16-18
    • Kemp, M.1
  • 23
    • 84882800335 scopus 로고    scopus 로고
    • Simple, state-based approaches to program-based anomaly detection
    • August
    • Michael C. C., A. Ghosh, "Simple, state-based approaches to program-based anomaly detection", ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pp. 203-237.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.3 , pp. 203-237
    • Michael, C.C.1    Ghosh, A.2
  • 27
    • 38049136994 scopus 로고    scopus 로고
    • Research on Hidden Markov Model for System Call Anomaly Detection
    • Chengdu, China
    • Qian Q., M. Xin, Research on Hidden Markov Model for System Call Anomaly Detection, Intelligence and Security Informatics, PAISI 2007, Chengdu, China, Volume 4430/2007, pp.152-159
    • (2007) Intelligence and Security Informatics, PAISI 2007 , vol.4430 , pp. 152-159
    • Qian, Q.1    Xin, M.2
  • 28
    • 0024610919 scopus 로고
    • A tutorial on Hidden Markov Models and selected applications in speech recognition
    • Feb
    • Rabiner L.R., A tutorial on Hidden Markov Models and selected applications in speech recognition, Proc. IEEE, 257-286, 77, 2, Feb 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 29
    • 0022594196 scopus 로고
    • An introduction to Hidden Markov Models
    • January
    • Rabiner L. R., B. H. Juang. An introduction to Hidden Markov Models, IEEE ASSP Magazine, pp.4-16, January 1986.
    • (1986) IEEE ASSP Magazine , pp. 4-16
    • Rabiner L., R.1    Juang, B.H.2
  • 30
    • 34548613852 scopus 로고    scopus 로고
    • Network Intrusion Detection Using Wavelet Analysis, Intelligent Information Technology
    • CIT 2004, Hyderabad, India, ISBN 978-3-540-24126-3
    • Rawat S., C. S. Sastry, Network Intrusion Detection Using Wavelet Analysis, Intelligent Information Technology, Proceedings of 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, ISBN 978-3-540-24126-3, 2004, pp. 224-232.
    • (2004) Proceedings of 7th International Conference on Information Technology , pp. 224-232
    • Rawat, S.1    Sastry, C.S.2
  • 32
    • 0034829697 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • S&P 2001
    • Sekar R., M. Bendre, Dhurjati, P. Bullineni, "A fast automaton-based method for detecting anomalous program behaviors, " IEEE Symposium on Security and Privacy, 2001. S&P 2001, pp. 144-155.
    • (2001) IEEE Symposium on Security and Privacy , pp. 144-155
    • Sekar, R.1    Bendre, M.2    Dhurjati, P.B.3
  • 34
    • 33845599591 scopus 로고    scopus 로고
    • On the Learning of System Call Attributes for Host-based Anomaly Detection
    • Tandon G., P. Chan, On the Learning of System Call Attributes for Host-based Anomaly Detection, International Journal on Artificial Intelligence Tools, 15(6), pp. 875-892, 2006.
    • (2006) International Journal on Artificial Intelligence Tools , vol.15 , Issue.6 , pp. 875-892
    • Tandon, G.1    Chan, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.