메뉴 건너뛰기




Volumn 1, Issue 3, 2005, Pages 138-146

The utility of partial knowledge in behavior models: An evaluation for intrusion detection

Author keywords

Intrusion detection; Machine learning; Model evaluation; Model generalization; Security

Indexed keywords

BEHAVIOR IDENTIFICATIONS; BEHAVIOR MODEL; BEHAVIOR SIGNATURE; DETECTION CAPABILITY; M OF N FEATURES; MODEL EVALUATION; MODEL GENERALIZATION; PARTIAL KNOWLEDGE; SECURITY;

EID: 77949272825     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (19)
  • 3
    • 2942749266 scopus 로고    scopus 로고
    • BlueBox: A policy-driven, host-based intrusion detection system
    • May
    • S. N. Chari and P. Cheng, "BlueBox: A policy-driven, host-based intrusion detection system," ACM Transaction on Infomation and System Security, vol. 6, no. 2, pp. 173-200, May 2003.
    • (2003) ACM Transaction on Infomation and System Securit , vol.6 , Issue.2 , pp. 173-200
    • Chari, S.N.1    Cheng, P.2
  • 4
    • 0036613083 scopus 로고    scopus 로고
    • An immunity-based technique to characterize intrusions in computer net-works
    • D. Dasgupta and F. González, "An immunity-based technique to characterize intrusions in computer net-works," IEEE Transactions on Evol. Comput., vol. 6, no. 3, pp. 1081-1088, 2002.
    • (2002) IEEE Transactions on Evol. Comput. , vol.6 , Issue.3 , pp. 1081-1088
    • Dasgupta, D.1    González, F.2
  • 5
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion detection systems
    • H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," Annales des Telecommunications, vol. 55, no. 7-8, pp. 361-378, 2000.
    • (2000) Annales des Telecommunications , vol.55 , Issue.7-8 , pp. 361-378
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 6
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Feb
    • D. E. Denning, "An intrusion detection model," IEEE Transaction on Software Engineering, vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
    • (1987) IEEE Transaction on Software Engineering , vol.SE13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 7
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • D Barbara and S. Jajodia (editors), Kluwer
    • E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," D. Barbara and S. Jajodia (editors), in em Applications of Data Mining in Computer Security, Kluwer, 2002.
    • (2002) in em Applications of Data Mining in Computer Securit
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Forrest, S.2    Somayaji, A.3
  • 10
    • 0035616570 scopus 로고    scopus 로고
    • A hybrid high-order markov chain model for computer intrusion detection
    • W. Ju and Y. Vardi, "A hybrid high-order markov chain model for computer intrusion detection," Journal of Computational and Graphical Statistics, vol. 10, no. 2, pp. 277-295, 2001.
    • (2001) Journal of Computational and Graphical Statistics , vol.10 , Issue.2 , pp. 277-295
    • Ju, W.1    Vardi, Y.2
  • 12
    • 84885774862 scopus 로고    scopus 로고
    • A framework for contructing features and models for intrusion detection systems
    • Nov
    • W. Lee and S. J. Stolfo, "A framework for contructing features and models for intrusion detection sys-tems," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 227-261, Nov. 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 227-261
    • Lee, W.1    Stolfo, S.J.2
  • 13
    • 85084160262 scopus 로고    scopus 로고
    • Using text categorization techniques for intrusion detection
    • Aug. 2002
    • Y. Liao and V. R. Vemuri, "Using text categorization techniques for intrusion detection," in Usenix: Security 2002, pp. 51-59, Aug. 2002.
    • in Usenix: Security , pp. 51-59
    • Liao, Y.1    Vemuri, V.R.2
  • 14
    • 19544375196 scopus 로고    scopus 로고
    • Learning nonstationary models of normal network traffic for detecting novel attacks
    • July 23-26
    • M. V. Mahoney and P. K. Chan, "Learning nonstationary models of normal network traffic for detecting novel attacks," in SIGKDD 2002, pp. 23-26, July 23-26 2002.
    • (2002) in SIGKDD , vol.2002 , pp. 23-26
    • Mahoney, M.V.1    Chan, P.K.2
  • 15
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • Oct
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach," IEEE Communications Magazine, vol. 40, no. 10, pp. 76-82, Oct. 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 7682
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 18
    • 35048885009 scopus 로고    scopus 로고
    • Anomalyous payload-based network intrusion detection
    • K. Wang and S. J. Stolfo, "Anomalyous payload-based network intrusion detection," in Proceedings of RAID, pp. 203-222, 2004.
    • (2004) in Proceedings of RAID , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 19
    • 84874709035 scopus 로고    scopus 로고
    • Wikipedia, Def
    • Wikipedia, Def. of 'Intrusion-Detection System', http://en.wikipedia.org/w/wiki.phtml?title=Intrusion-detection_system.
    • of 'Intrusion-Detection System'


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.