메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Combining Hidden Markov Models for improved anomaly detection

Author keywords

Anomaly detection; Hidden Markov models; Host based intrusion detection systems; Multi classifier systems

Indexed keywords

ALPHABET SIZE; ANOMALY DETECTION; CRITICAL PARAMETER; DATA SETS; HIDDEN STATE; HOST BASED INTRUSION DETECTION SYSTEMS; HOST-BASED INTRUSION DETECTION SYSTEM; IRREGULARITY INDEX; MULTI-CLASSIFIER SYSTEMS; OPERATING SYSTEM KERNEL; RECEIVER OPERATING CHARACTERISTICS; SEQUENCE MATCHING; SINGLE-VALUE; STORAGE OVERHEAD; SYSTEM BEHAVIORS; SYSTEM CALLS; TRAINING DATA; TRAINING SETS;

EID: 70449499748     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2009.5198832     Document Type: Conference Paper
Times cited : (31)

References (17)
  • 3
    • 0024610919 scopus 로고
    • A tutorial on HMM and selected applications in speech recognition
    • L. Rabiner, "A tutorial on HMM and selected applications in speech recognition," Proc. of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
    • (1989) Proc. of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 5
    • 84890861404 scopus 로고    scopus 로고
    • A multi-layer model for anomaly intrusion detection
    • X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection," in IEEE Int'l Conf. on Networks, vol. 1, pp. 531-536, 2003.
    • (2003) IEEE Int'l Conf. on Networks , vol.1 , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 6
    • 21644438395 scopus 로고    scopus 로고
    • An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
    • X. Hoang and J. Hu, "An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls," in IEEE Int'l Conf. on Networks, vol. 2, pp. 470-474, 2004.
    • (2004) IEEE Int'l Conf. on Networks , vol.2 , pp. 470-474
    • Hoang, X.1    Hu, J.2
  • 8
    • 0007210317 scopus 로고    scopus 로고
    • Realisable classifiers: Improving operating performance on variable cost problems
    • University of Southampton, UK, pp, Sep
    • M. J. J. Scott, M. Niranjan, and R. W. Prager, "Realisable classifiers: Improving operating performance on variable cost problems," in Proc. of the 9th British Machine Vision Conference, vol. 1, (University of Southampton, UK), pp. 304-315, Sep 1998.
    • (1998) Proc. of the 9th British Machine Vision Conference , vol.1 , pp. 304-315
    • Scott, M.J.J.1    Niranjan, M.2    Prager, R.W.3
  • 9
    • 70449497481 scopus 로고    scopus 로고
    • J. Choy and S.-B. Cho, Intrusion detection by combining multiple HMMs, PRICAI 2000 Topics in Artificial Intelligence, 1886, pp. 829-829, 2000.
    • J. Choy and S.-B. Cho, "Intrusion detection by combining multiple HMMs," PRICAI 2000 Topics in Artificial Intelligence, vol. 1886, pp. 829-829, 2000.
  • 10
    • 33646023117 scopus 로고    scopus 로고
    • An introduction to ROC analysis
    • T. Fawcett, "An introduction to ROC analysis," Pattern Recogn. Lett., vol. 27, no. 8, pp. 861-874, 2006.
    • (2006) Pattern Recogn. Lett , vol.27 , Issue.8 , pp. 861-874
    • Fawcett, T.1
  • 11
    • 0000353178 scopus 로고
    • A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains
    • L. E. Baum, G. S. Petrie, and N. Weiss, "A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains," Ann. Math. Stat., vol. 41, no. 1, pp. 164-171, 1970.
    • (1970) Ann. Math. Stat , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.E.1    Petrie, G.S.2    Weiss, N.3
  • 12
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • D.-Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognition, vol. 36, no. 1, pp. 229-243, 2003.
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.-Y.1    Ding, Y.2
  • 15
    • 0036085540 scopus 로고    scopus 로고
    • Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
    • K. Tan and R. Maxion, ""Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector," in IEEE Symp. on Security and Privacy, pp. 188-201, 2002.
    • (2002) IEEE Symp. on Security and Privacy , pp. 188-201
    • Tan, K.1    Maxion, R.2
  • 16
    • 0037252253 scopus 로고    scopus 로고
    • Determining the operational limits of an anomaly-based intrusion detector
    • K. Tan and R. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. on Selected Areas in Communications, vol. 21, no. 1, pp. 96-110, 2003.
    • (2003) IEEE J. on Selected Areas in Communications , vol.21 , Issue.1 , pp. 96-110
    • Tan, K.1    Maxion, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.