메뉴 건너뛰기




Volumn 82, Issue 12, 2009, Pages 1974-1981

Constructing attribute weights from computer audit data for effective intrusion detection

Author keywords

Chi square; Distance measures; Intrusion detection; k Nearest neighbor; Masquerade detection; Principal component analysis

Indexed keywords

BEHAVIORAL RESEARCH; INVERSE PROBLEMS; NEAREST NEIGHBOR SEARCH; PRINCIPAL COMPONENT ANALYSIS; STATISTICAL TESTS; TEXT PROCESSING;

EID: 71749108310     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2009.06.040     Document Type: Article
Times cited : (41)

References (25)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information Systems Security 3 3 (2000) 186-205
    • (2000) ACM Transactions on Information Systems Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 2
    • 0003516333 scopus 로고    scopus 로고
    • Intrusion detection systems: A survey and taxonomy
    • Technical Report 99-15, Chalmers Univ
    • Axelsson, S., 2000. Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, Chalmers Univ.
    • (2000)
    • Axelsson, S.1
  • 3
    • 13544269338 scopus 로고    scopus 로고
    • Application of SVM and ANN for intrusion detection
    • Chen W.H., Hsu S.H., and Shen H.P. Application of SVM and ANN for intrusion detection. Computer Operation Research 32 (2005) 2617-2634
    • (2005) Computer Operation Research , vol.32 , pp. 2617-2634
    • Chen, W.H.1    Hsu, S.H.2    Shen, H.P.3
  • 4
    • 0037282635 scopus 로고    scopus 로고
    • Efficient anomaly detection by modeling privilege flows using hidden markov model
    • Cho S.B., and Park H.J. Efficient anomaly detection by modeling privilege flows using hidden markov model. Computer and Security 22 1 (2003) 45-55
    • (2003) Computer and Security , vol.22 , Issue.1 , pp. 45-55
    • Cho, S.B.1    Park, H.J.2
  • 9
    • 24944563451 scopus 로고    scopus 로고
    • Robust support vector machines for anomaly detection in computer security
    • International Conference on Machine Learning and Applications
    • Hu, W., Liao, Y., Vemuri, V.R., 2003. Robust support vector machines for anomaly detection in computer security. In: Proceeding of the 2003 International Conference on Machine Learning and Applications.
    • (2003) Proceeding of the
    • Hu, W.1    Liao, Y.2    Vemuri, V.R.3
  • 13
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • Liao, Y., Vemuri, V.R., 2002. Using text categorization techniques for intrusion detection. In: 11th USENIX Security Symposium, pp. 51-59.
    • (2002) 11th USENIX Security Symposium , pp. 51-59
    • Liao, Y.1    Vemuri, V.R.2
  • 14
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters 76 (2000) 33-38
    • (2000) Information Processing Letters , vol.76 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 18
    • 85083870977 scopus 로고    scopus 로고
    • Detecting masquerades with principal component analysis based on cross frequency weights
    • Munich, Germany, pp
    • Wang, W., Gombault, S., 2007b. Detecting masquerades with principal component analysis based on cross frequency weights. In: Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232.
    • (2007) Proceedings of 14th Anniversary HP-SUA Workshop , pp. 227-232
    • Wang, W.1    Gombault, S.2
  • 20
    • 33750333036 scopus 로고    scopus 로고
    • Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
    • Wang W., Guan X., Zhang X., and Yang L. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Computers and Security, Elsevier 25 7 (2006) 539-550
    • (2006) Computers and Security, Elsevier , vol.25 , Issue.7 , pp. 539-550
    • Wang, W.1    Guan, X.2    Zhang, X.3    Yang, L.4
  • 21
    • 37049002837 scopus 로고    scopus 로고
    • Processing of massive audit data streams for real-time anomaly intrusion detection
    • Wang W., Guan X., and Zhang X. Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications Elsevier 31 1 (2008) 58-72
    • (2008) Computer Communications Elsevier , vol.31 , Issue.1 , pp. 58-72
    • Wang, W.1    Guan, X.2    Zhang, X.3
  • 24
    • 0037209446 scopus 로고    scopus 로고
    • Host-based intrusion detection using dynamic and static behavioral models
    • Yeung D.Y., and Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 1 (2003) 229-243
    • (2003) Pattern Recognition , vol.36 , Issue.1 , pp. 229-243
    • Yeung, D.Y.1    Ding, Y.2
  • 25
    • 21844433474 scopus 로고    scopus 로고
    • Application of online-training SVMS for real-time intrusion detection with different considerations
    • Zhang Z., and Shen H. Application of online-training SVMS for real-time intrusion detection with different considerations. Computer Communications 28 (2005) 1428-1442
    • (2005) Computer Communications , vol.28 , pp. 1428-1442
    • Zhang, Z.1    Shen, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.