메뉴 건너뛰기




Volumn 5, Issue 3, 2002, Pages 203-237

Simple, State-Based Approaches to Program-Based Anomaly Detection

Author keywords

Anomaly Detection; Experimentation; Finite Automata; Information System Security; Intrusion Detection; Machine Learning; Performance; Security

Indexed keywords


EID: 84882800335     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/545186.545187     Document Type: Article
Times cited : (85)

References (30)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • Fort Washington, Pa
    • anderson, J. 1980. Computer security threat monitoring and surveillance. Tech. Rep. James P. anderson Co., Fort Washington, Pa.
    • (1980) Tech. Rep. James P. anderson Co.
    • anderson, J.1
  • 4
    • 0029718285 scopus 로고    scopus 로고
    • An immunological approach to change detection: Algorithms, analysis and implications
    • IEEE Computer Society Press, Los Alamitos, Calif
    • D'Haeseleer, P., Forrest, S., and Helman, P. 1996. An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif.
    • (1996) Proceedings of the IEEE Symposium on Security and Privacy.
    • D'Haeseleer, P.1    Forrest, S.2    Helman, P.3
  • 5
    • 85036529638 scopus 로고    scopus 로고
    • Intrusion detection: Applying machine learning to solaris audit data
    • (Scottsdale, Az.). IEEE Computer Society Press, Los Alamitos, Calif
    • Endler, D. 1998. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998Annual Computer Security Applications Conference (ACSAC'98). (Scottsdale, Az.). IEEE Computer Society Press, Los Alamitos, Calif., 268-279.
    • (1998) Proceedings of the 1998Annual Computer Security Applications Conference (ACSAC'98). , pp. 268-279
    • Endler, D.1
  • 7
    • 0002023197 scopus 로고    scopus 로고
    • Efficient learning of typical finite automata from random walks
    • (10 Oct.)
    • Freund, Y., Kearns, M., Ron, D., Rubinfeld, R., Schapire, R. E., and Sellie, L. 1997. Efficient learning of typical finite automata from random walks. Inf. Comput. 138, 1 (10 Oct.), 23-48.
    • (1997) Inf. Comput. , vol.138 , pp. 23-48
    • Freund, Y.1    Kearns, M.2    Ron, D.3    Rubinfeld, R.4    Schapire, R.E.5    Sellie, L.6
  • 8
    • 80052007699 scopus 로고    scopus 로고
    • A real-time intrusion detection system based on learning program behavior
    • H. Debar, L. Me, and F. Wu, Eds. Lecture Notes in Computer Science Springer, Berlin
    • Ghosh, A., Michael, C. C., and Schatz, M. 2000. A real-time intrusion detection system based on learning program behavior. In Recent Advances in Intrusion Detection; Third International Workshop. H. Debar, L. Me, and F. Wu, Eds. Lecture Notes in Computer Science, vol. 1907. Springer, Berlin, 93-109.
    • (2000) Recent Advances in Intrusion Detection; Third International Workshop. , vol.1907 , pp. 93-109
    • Ghosh, A.1    Michael, C.C.2    Schatz, M.3
  • 14
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion detection via system call traces
    • (Sept./Oct.)
    • Kosoresow, A. P. and Hofmeyr, S. A. 1997. Intrusion detection via system call traces. IEEE Softw. 14, 5 (Sept./Oct.), 24-42.
    • (1997) IEEE Softw. , vol.14 , pp. 24-42
    • Kosoresow, A.P.1    Hofmeyr, S.A.2
  • 15
    • 0032202049 scopus 로고    scopus 로고
    • Information bounds and quick detection of parameter changes in stochastic systems
    • LAI, T. L. 1998. Information bounds and quick detection of parameter changes in stochastic systems. IEEE Trans. Inf. Theory 44, 7, 2917-2929.
    • (1998) IEEE Trans. Inf. Theory 44 , vol.7 , pp. 2917-2929
    • LAI, T.L.1
  • 17
    • 77949731575 scopus 로고    scopus 로고
    • Temporal sequence learning and data reduction for anomaly detection
    • Lane, T. and Brodley, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inf. Syst. Sec. 2, 3, 295-331.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , pp. 295-331
    • Lane, T.1    Brodley, C.E.2
  • 18
    • 84947908042 scopus 로고    scopus 로고
    • Results of the abbadingo one dfa learning competition and a new evidence driven state merging algorithm
    • Lecture Notes in Artificial Intelligence Springer-Verlag, New York
    • Lang, K., Pearlmutter, B., and PRICE, R. 1998. Results of the abbadingo one dfa learning competition and a new evidence driven state merging algorithm. In Proceedings of the International Colloquium on Grammatical Inference (ICGA-98). Lecture Notes in Artificial Intelligence, vol. 1433. Springer-Verlag, New York, 1-12.
    • (1998) Proceedings of the International Colloquium on Grammatical Inference (ICGA-98). , vol.1433 , pp. 1-12
    • Lang, K.1    Pearlmutter, B.2    PRICE, R.3
  • 21
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • Lunt, T. 1993. A survey of intrusion detection techniques. Comput. Sec. 12,405-418.
    • (1993) Comput. Sec. , vol.12 , pp. 405-418
    • Lunt, T.1
  • 24
    • 33947272541 scopus 로고    scopus 로고
    • Two state-based approaches to program-based anomaly detection
    • Michael, C. C. and GHOSH, A. 2000. Two state-based approaches to program-based anomaly detection. In Proceedings ofACSAC 2000. 21-30.
    • (2000) Proceedings ofACSAC 2000 , pp. 21-30
    • Michael, C.C.1    GHOSH, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.