메뉴 건너뛰기




Volumn 39, Issue , 2010, Pages 745-774

Intrusion detection using continuous time bayesian networks

Author keywords

[No Author keywords available]

Indexed keywords

ABNORMAL BEHAVIOR; ANOMALY DETECTION; BURSTINESS; CONTINUOUS TIME; CONTINUOUS TIME MODELS; DATA SETS; DISCRETE-TIME MODEL; FINITE RESOLUTION; GENERATIVE MODEL; HOST-BASED; INTRUSION DETECTION SYSTEMS; LEARNING METHODS; LOG FILE; MONITOR SYSTEM; NETWORK BASED SYSTEMS; NETWORK BEHAVIORS; NETWORK PACKET TRACES; RAO-BLACKWELLIZED PARTICLE FILTERING; TIME STAMPS; TRAINING DATA;

EID: 78651432290     PISSN: None     EISSN: 10769757     Source Type: Journal    
DOI: 10.1613/jair.3050     Document Type: Article
Times cited : (80)

References (46)
  • 3
    • 33646903968 scopus 로고    scopus 로고
    • Host anomaly detection performance analysis based on system call of neuro-fuzzy using soundex algorithm and n-gram technique
    • Cha, B. (2005). Host anomaly detection performance analysis based on system call of neuro-fuzzy using soundex algorithm and n-gram technique. In Systems Communications (ICW).
    • (2005) Systems Communications (ICW)
    • Cha, B.1
  • 6
    • 56049084701 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non Gaussian multiresulotion statistical detection procedures
    • Dewaele, G., Fukuda, K., & Borgnat, P. (2007). Extracting hidden anomalies using sketch and non Gaussian multiresulotion statistical detection procedures. In ACM SIGCOMM.
    • (2007) ACM SIGCOMM
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3
  • 10
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • Eskin, E. (2000). Anomaly detection over noisy data using learned probability distributions. In International Conference on Machine Learning.
    • (2000) International Conference on Machine Learning
    • Eskin, E.1
  • 11
    • 0141797880 scopus 로고    scopus 로고
    • A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
    • Barbara, D., & Jajodia, S. (Eds.) Kluwer
    • Eskin, E., Arnold, A., Prerau, M., Portnoy, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Barbara, D., & Jajodia, S. (Eds.), Applications of Data Mining in Computer Security. Kluwer.
    • (2002) Applications of Data Mining in Computer Security
    • Eskin, E.1    Arnold, A.2    Prerau, M.3    Portnoy, L.4    Stolfo, S.5
  • 19
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Lakhina, A., Crovella, M., & Diot, C. (2005). Mining anomalies using traffic feature distributions. In ACM SIGCOMM, pp. 21-26.
    • (2005) ACM SIGCOMM , pp. 21-26
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 22
    • 0036358995 scopus 로고    scopus 로고
    • The spectrum kernel: A string kernel for SVM protein classification
    • Leslie, C., Eskin, E., & Noble, W. S. (2002). The spectrum kernel: A string kernel for SVM protein classification. In Pacific Symposium on Biocomputing 7:566-575.
    • (2002) Pacific Symposium on Biocomputing , vol.7 , pp. 566-575
    • Leslie, C.1    Eskin, E.2    Noble, W.S.3
  • 23
    • 31844455702 scopus 로고    scopus 로고
    • Host-based detection of worms through peer to peer cooperation
    • Malan, D. J., & Smith, M. D. (2005). Host-based detection of worms through peer to peer cooperation. In Workshop on Rapid Malcode.
    • (2005) Workshop on Rapid Malcode
    • Malan, D.J.1    Smith, M.D.2
  • 25
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • Moore, A. W., & Zuev, D. (2005). Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS.
    • (2005) ACM SIGMETRICS
    • Moore, A.W.1    Zuev, D.2
  • 31
    • 77958587560 scopus 로고    scopus 로고
    • Expectation maximization and complex duration distributions for continuous time Bayesian networks
    • Nodelman, U., Shelton, C. R., & Koller, D. (2005). Expectation maximization and complex duration distributions for continuous time Bayesian networks. In Uncertainty in Artificial Intelligence, pp. 421-430.
    • (2005) Uncertainty in Artificial Intelligence , pp. 421-430
    • Nodelman, U.1    Shelton, C.R.2    Koller, D.3
  • 33
    • 21644485091 scopus 로고    scopus 로고
    • Attack plan recognition and prediction using causal networks
    • Qin, X., & Lee, W. (2004). Attack plan recognition and prediction using causal networks. In Annual Computer Security Application Conference, pp. 370-379.
    • (2004) Annual Computer Security Application Conference , pp. 370-379
    • Qin, X.1    Lee, W.2
  • 34
    • 33846910249 scopus 로고    scopus 로고
    • Language models for detection of unknown attacks in network traffic
    • Rieck, K., & Laskov, P. (2007). Language models for detection of unknown attacks in network traffic. In Journal in Computer Virology.
    • (2007) Journal in Computer Virology
    • Rieck, K.1    Laskov, P.2
  • 38
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • Soule, A., Salamatian, K., & Taft, N. (2005). Combining filtering and statistical methods for anomaly detection. In Internet Measurement Conference, pp. 331-344.
    • (2005) Internet Measurement Conference , pp. 331-344
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 41
    • 77956942179 scopus 로고    scopus 로고
    • Continuous time Bayesian networks for host level network intrusion detection
    • Xu, J., & Shelton, C. R. (2008). Continuous time Bayesian networks for host level network intrusion detection. In European Conference on Machine Learning.
    • (2008) European Conference on Machine Learning
    • Xu, J.1    Shelton, C.R.2
  • 42
    • 33750375994 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • Xu, K., Zhang, Z.-L., & Bhattacharyya, S. (2005). Profiling internet backbone traffic: Behavior models and applications. In ACM SIGCOMM.
    • (2005) ACM SIGCOMM
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 43
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection.
    • Ye, N., Emran, S. M., Chen, Q., & Vilbert, S. (2002). Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions of Computers, 51(7), 810-820.
    • (2002) IEEE Transactions of Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 45
    • 78651413507 scopus 로고    scopus 로고
    • User profiling for intrusion detection using dynamic and static behavioral models
    • Yeung, D.-Y., & Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral models. Advances in Knowledge Discovery and Data Mining, 2336, 494-505.
    • (2002) Advances in Knowledge Discovery and Data Mining , vol.2336 , pp. 494-505
    • Yeung, D.-Y.1    Ding, Y.2
  • 46
    • 84869166587 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • Zuev, D., & Moore, A. (2005). Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS.
    • (2005) ACM SIGMETRICS
    • Zuev, D.1    Moore, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.