메뉴 건너뛰기




Volumn 2336, Issue , 2002, Pages 494-505

User profiling for intrusion detection using dynamic and static behavioral models

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; BEHAVIORAL RESEARCH; DATA MINING; DIGITAL STORAGE; ENTROPY; FAULT TOLERANT COMPUTER SYSTEMS; HIDDEN MARKOV MODELS; MAXIMUM LIKELIHOOD; NETWORK SECURITY;

EID: 78651413507     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-47887-6_49     Document Type: Conference Paper
Times cited : (7)

References (23)
  • 1
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • L.E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Annals of Mathematical Statistics, 41(1):164–171, 1970.
    • (1970) Annals of Mathematical Statistics , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.E.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 4
    • 0026075750 scopus 로고
    • Autoassociation and novelty detection by neuromechanics
    • W.J. Daunicht. Autoassociation and novelty detection by neuromechanics. Science, 253(5025):1289–1291, 1991.
    • (1991) Science , vol.253 , Issue.5025 , pp. 1289-1291
    • Daunicht, W.J.1
  • 7
    • 85036529638 scopus 로고    scopus 로고
    • Intrusion detection: Applying machine learning to Solaris audit data
    • Phoenix, AZ, USA, 7–11 December
    • D. Endler. Intrusion detection: applying machine learning to Solaris audit data. In Proceedings of the Fourteenth Annual Computer Security Applications Conference, pages 268–279, Phoenix, AZ, USA, 7–11 December 1998.
    • (1998) Proceedings of the Fourteenth Annual Computer Security Applications Conference , pp. 268-279
    • Endler, D.1
  • 12
    • 84913827229 scopus 로고
    • Comments on and correction to’axiomatic derivation of the principle of maximum entropy and the principle of minimum crossentropy’ (Jan 80 26–37)
    • R.W. Johnson and J.E. Shore. Comments on and correction to’axiomatic derivation of the principle of maximum entropy and the principle of minimum crossentropy’ (Jan 80 26–37). IEEE Transactions on Information Theory, 29(6):942–943, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.6 , pp. 942-943
    • Johnson, R.W.1    Shore, J.E.2
  • 14
    • 0002979739 scopus 로고    scopus 로고
    • Hidden Markov models for human/computer interface modeling
    • Stockholm, Sweden, 31 July
    • T. Lane. Hidden Markov models for human/computer interface modeling. In Proceedings of the IJCAI-99 Workshop on Learning about Users, pages 35–44, Stockholm, Sweden, 31 July 1999.
    • (1999) Proceedings of the IJCAI-99 Workshop on Learning about Users , pp. 35-44
    • Lane, T.1
  • 16
  • 17
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • San Antonio, TX, USA, 26-29 January
    • W. Lee and S.J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the Seventh USENIX Security Symposium, pages 79–93, San Antonio, TX, USA, 26-29 January 1998.
    • (1998) Proceedings of the Seventh USENIX Security Symposium , pp. 79-93
    • Lee, W.1    Stolfo, S.J.2
  • 19
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • L.R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257–286, 1989.
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 20
    • 84898944587 scopus 로고    scopus 로고
    • Intrusion detection with neural networks
    • M.I. Jordan, M.J. Kearns, and S.A. Solla, editors, MIT Press
    • J. Ryan, M.J. Lin, and R. Miikkulainen. Intrusion detection with neural networks. In M.I. Jordan, M.J. Kearns, and S.A. Solla, editors, Advances in Neural Information Processing Systems 10, pages 943–949. MIT Press, 1998.
    • (1998) Advances in Neural Information Processing Systems , vol.10 , pp. 943-949
    • Ryan, J.1    Lin, M.J.2    Miikkulainen, R.3
  • 21
    • 0034325396 scopus 로고    scopus 로고
    • Detecting masquerades in intrusion detection based on unpopular commands
    • M. Schonlau and M. Theus. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters, 76(1/2):33–38, 2000.
    • (2000) Information Processing Letters , vol.76 , Issue.1-2 , pp. 33-38
    • Schonlau, M.1    Theus, M.2
  • 22
    • 0018877134 scopus 로고
    • Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy
    • J.E. Shore and R.W. Johnson. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Transactions on Information Theory, 26(1):26–37, 1980.
    • (1980) IEEE Transactions on Information Theory , vol.26 , Issue.1 , pp. 26-37
    • Shore, J.E.1    Johnson, R.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.