메뉴 건너뛰기




Volumn 30, Issue 4, 2011, Pages 221-241

HMMPayl: An intrusion detection system based on Hidden Markov Models

Author keywords

Anomaly detection; Hidden Markov Models; Multiple classifiers; Network intrusion detection; Payload analysis

Indexed keywords

ANOMALY DETECTION; CLASSIFICATION ACCURACY; COMPUTER SECURITY; DATA SETS; DETECTION RATES; EXPRESSIVE POWER; FALSE POSITIVE RATES; INTRUSION DETECTION SYSTEMS; KEY TOPICS; MULTIPLE CLASSIFIERS; MULTIPLE CLASSIFIERS SYSTEMS; NETWORK INTRUSION DETECTION; OPTIMAL CHOICE; PAYLOAD ANALYSIS; WEB APPLICATION; WEB SERVERS;

EID: 79955482186     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2010.12.004     Document Type: Article
Times cited : (118)

References (51)
  • 1
    • 84965063004 scopus 로고
    • An inequality with applications to statistical estimation for probabilistic function of a Markov process and to a model for ecology
    • L. Baum, and J. Egon An inequality with applications to statistical estimation for probabilistic function of a Markov process and to a model for ecology Bulletin American Metereology Society 73 1967 360 363
    • (1967) Bulletin American Metereology Society , vol.73 , pp. 360-363
    • Baum, L.1    Egon, J.2
  • 2
    • 84972571328 scopus 로고
    • Growth functions for transformations on manifolds
    • L. Baum, and G. Sell Growth functions for transformations on manifolds Pacific Journal of Mathematics 27 2 1968 211 227
    • (1968) Pacific Journal of Mathematics , vol.27 , Issue.2 , pp. 211-227
    • Baum, L.1    Sell, G.2
  • 3
    • 0000353178 scopus 로고
    • A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
    • L. Baum, T. Petrie, G. Soules, and N. Weiss A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains The Annals of Mathematical Statistics 41 1 1970 164 171
    • (1970) The Annals of Mathematical Statistics , vol.41 , Issue.1 , pp. 164-171
    • Baum, L.1    Petrie, T.2    Soules, G.3    Weiss, N.4
  • 4
    • 58349121261 scopus 로고    scopus 로고
    • Adversarial pattern classification using multiple classifiers and randomisation
    • SSPR/SPR
    • B. Biggio, G. Fumera, and F. Roli Adversarial pattern classification using multiple classifiers and randomisation N. da Vitoria Lobo, T. Kasparis, F. Roli, JT.-Y. Kwok, M. Georgiopoulos, G.C. Anagnostopoulos, M. Loog, SSPR/SPR Lecture notes in computer science vol. 5342 2008 Springer 500 509
    • (2008) Lecture Notes in Computer Science , vol.5342 , pp. 500-509
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 5
    • 70349319703 scopus 로고    scopus 로고
    • Multiple classifier systems for adversarial classification tasks
    • MCS
    • A. Biggio, G. Fumera, and F. Roli Multiple classifier systems for adversarial classification tasks J.A. Benediktsson, J. Kittler, F. Roli, MCS Lecture notes in computer science vol. 5519 2009 Springer 132 141
    • (2009) Lecture Notes in Computer Science , vol.5519 , pp. 132-141
    • Biggio, A.1    Fumera, G.2    Roli, F.3
  • 6
    • 0031191630 scopus 로고    scopus 로고
    • The use of the area under the ROC curve in the evaluation of machine learning algorithms
    • PII S0031320396001422
    • A.P. Bradley The use of the area under the roc curve in the evaluation of machine learning algorithms Pattern Recognition 30 7 1997 1145 1159 (Pubitemid 127406521)
    • (1997) Pattern Recognition , vol.30 , Issue.7 , pp. 1145-1159
    • Bradley, A.P.1
  • 8
    • 79955470920 scopus 로고    scopus 로고
    • Breach Security Inc
    • Breach Security Inc WebDefend November 2009 http://www.breach.com/ products/webdefend.html
    • (2009) WebDefend
  • 9
    • 21144432658 scopus 로고    scopus 로고
    • Two sophisticated techniques to improve HMM-based intrusion detection systems
    • RAID
    • S.-B. Cho, and S.-J. Han Two sophisticated techniques to improve HMM-based intrusion detection systems G. Vigna, E. Jonsson, C. Krügel, RAID Lecture notes in computer science vol. 2820 2003 Springer 207 219
    • (2003) Lecture Notes in Computer Science , vol.2820 , pp. 207-219
    • Cho, S.-B.1    Han, S.-J.2
  • 10
    • 79955463417 scopus 로고    scopus 로고
    • Citrix Systems Inc
    • Citrix Systems Inc Netscaler application firewall November 2009 http://www.citrix.com/English/PS2/products/product.asp?contentID=25636
    • (2009) Netscaler Application Firewall
  • 12
  • 14
    • 0028911698 scopus 로고
    • Gauging similarity with n-grams: Language-independent categorization of text
    • M. Damashek Gauging similarity with n-grams: language-independent categorization of text Science 267 5199 1995 843 848
    • (1995) Science , vol.267 , Issue.5199 , pp. 843-848
    • Damashek, M.1
  • 16
    • 80053403826 scopus 로고    scopus 로고
    • Ensemble methods in machine learning
    • Multiple classifier systems
    • T.G. Dietterich Ensemble methods in machine learning J. Kittler, F. Roli, Multiple classifier systems Lecture notes in computer science vol. 1857 2000 Springer 1 15
    • (2000) Lecture Notes in Computer Science , vol.1857 , pp. 1-15
    • Dietterich, T.G.1
  • 19
    • 79955470570 scopus 로고    scopus 로고
    • F5 Networks Inc
    • F5 Networks Inc BIG-IP application security manager November 2009 http://www.f5.com/products/big-ip/product-modules/application-security-manager. html
    • (2009) BIG-IP Application Security Manager
  • 20
    • 77954790951 scopus 로고    scopus 로고
    • Using artificial anomalies to detect unknown and known network intrusions
    • W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan Using artificial anomalies to detect unknown and known network intrusions Knowledge and Information Systems 6 5 2004 507 527
    • (2004) Knowledge and Information Systems , vol.6 , Issue.5 , pp. 507-527
    • Fan, W.1    Miller, M.2    Stolfo, S.3    Lee, W.4    Chan, P.5
  • 22
    • 67649202948 scopus 로고    scopus 로고
    • Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
    • D. Gao, M. Reiter, and D. Song Beyond output voting: detecting compromised replicas using HMM-based behavioral distance IEEE Transactions on Dependable and Secure Computing 6 2 2009 96 110
    • (2009) IEEE Transactions on Dependable and Secure Computing , vol.6 , Issue.2 , pp. 96-110
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 23
    • 79955465912 scopus 로고    scopus 로고
    • Ghmm: General Hidden Markov Model library
    • Ghmm: General Hidden Markov Model library, http://ghmm.org/.
  • 25
    • 38149142569 scopus 로고    scopus 로고
    • Comparing anomaly detection techniques for HTTP
    • RAID
    • K.L. Ingham, and H. Inoue Comparing anomaly detection techniques for HTTP C. Krügel, R. Lippmann, A. Clark, RAID Lecture notes in computer science vol. 4637 2007 Springer 42 62
    • (2007) Lecture Notes in Computer Science , vol.4637 , pp. 42-62
    • Ingham, K.L.1    Inoue, H.2
  • 26
    • 79955485242 scopus 로고    scopus 로고
    • Internet Security Systems IBM Global Technology Services
    • Internet Security Systems IBM-ISS, X-force 2009 trend and risk report Tech. rep. 2010 IBM Global Technology Services
    • (2010) IBM-ISS, X-force 2009 Trend and Risk Report
  • 32
    • 79955464790 scopus 로고    scopus 로고
    • Libpcap: Network programming library
    • Libpcap: Network programming library, http://www.tcpdump.org.
  • 33
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 darpa off-line intrusion detection evaluation
    • R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das The 1999 darpa off-line intrusion detection evaluation Computer Networks 34 4 2000 579 595 [recent Advances in Intrusion Detection Systems]
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.W.2    Fried, D.J.3    Korba, J.4    Das, K.5
  • 34
    • 76649142367 scopus 로고    scopus 로고
    • Protecting a moving target: Addressing web application concept drift
    • RAID
    • F. Maggi, W.K. Robertson, C. Krügel, and G. Vigna Protecting a moving target: addressing web application concept drift E. Kirda, S. Jha, D. Balzarotti, RAID Lecture notes in computer Science vol. 5758 2009 Springer 21 40
    • (2009) Lecture Notes in Computer Science , vol.5758 , pp. 21-40
    • Maggi, F.1    Robertson, W.K.2    Krügel, C.3    Vigna, G.4
  • 36
    • 79955483154 scopus 로고    scopus 로고
    • Programming with libpcap - Sniffing the network from our own application
    • L. MartinGarcia Programming with libpcap - sniffing the network from our own application Hakin9 Magazine February 2008 http://recursos.aldabaknocking. com/libpcapHakin9LuisMartinGarcia.pdf
    • (2008) Hakin9 Magazine
    • Martingarcia, L.1
  • 38
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
    • J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 262-294
    • McHugh, J.1
  • 39
    • 60349101742 scopus 로고    scopus 로고
    • Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
    • DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
    • R. Perdisci, G. Gu, and W. Lee Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems Data Mining ICDM'06. Sixth international conference on, 2006 2006 488 498 (Pubitemid 47485828)
    • (2007) Proceedings - IEEE International Conference on Data Mining, ICDM , pp. 488-498
    • Perdisci, R.1    Gu, O.2    Lee, W.3
  • 40
    • 61749083929 scopus 로고    scopus 로고
    • Mcpad: A multiple classifier system for accurate payload-based anomaly detection
    • R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee Mcpad: a multiple classifier system for accurate payload-based anomaly detection Computer Networks 53 6 2009 864 881 [Special Issue on Traffic Classification and Its Applications to Modern Networks]
    • (2009) Computer Networks , vol.53 , Issue.6 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 41
    • 0024610919 scopus 로고
    • A tutorial on Hidden Markov Models and selected applications in speech recognition
    • L. Rabiner A tutorial on Hidden Markov Models and selected applications in speech recognition Proceedings of the IEEE 77 2 1989 257 286
    • (1989) Proceedings of the IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.1
  • 42
    • 79955464675 scopus 로고    scopus 로고
    • RFC 2616-Hypertext Transfer Protocol - HTTP/1.1, 1999
    • RFC 2616-Hypertext Transfer Protocol - HTTP/1.1, 1999.
  • 45
    • 85180633963 scopus 로고    scopus 로고
    • Spectrogram: A mixture-of-Markov-chains model for anomaly detection in web traffic
    • The Internet Society
    • Y. Song, A.D. Keromytis, and S.J. Stolfo Spectrogram: a mixture-of-Markov-chains model for anomaly detection in web traffic NDSS 2009 The Internet Society
    • (2009) NDSS
    • Song, Y.1    Keromytis, A.D.2    Stolfo, S.J.3
  • 47
    • 48149094330 scopus 로고    scopus 로고
    • Dynamic score selection for fusion of multiple biometric matchers
    • R. Tronci, G. Giacinto, and F. Roli Dynamic score selection for fusion of multiple biometric matchers R. Cucchiara, ICIAP, IEEE computer Society 2007 15 22
    • (2007) ICIAP, IEEE Computer Society , pp. 15-22
    • Tronci, R.1    Giacinto, G.2    Roli, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.