메뉴 건너뛰기




Volumn , Issue , 2013, Pages 83-88

A multi-order markov chain based scheme for anomaly detection

Author keywords

anomaly detection; Kth order Markov chain; Markov chain; multivariate time series

Indexed keywords

ABNORMAL BEHAVIOURS; ABSOLUTE VALUES; ANOMALY DETECTION; CALCULATION RESULTS; DEFENSE ADVANCED RESEARCH PROJECTS AGENCIES; KTH-ORDER MARKOV CHAIN; MULTIVARIATE TIME SERIES; TRAINING AND TESTING;

EID: 84885669666     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSACW.2013.12     Document Type: Conference Paper
Times cited : (18)

References (15)
  • 2
    • 0036321445 scopus 로고    scopus 로고
    • Use of K-nearest neighbor classifier for intrusion detection
    • Yihua Liao, V.Rao Vemuri, Use of K-nearest Neighbor Classifier for Intrusion Detection, Computers & Security. 21(5): 439-448, 2002
    • (2002) Computers & Security , vol.21 , Issue.5 , pp. 439-448
    • Liao, Y.1    Vemuri, V.R.2
  • 5
    • 0141776045 scopus 로고    scopus 로고
    • A markov chain model of temporal behavior for anomaly detection
    • West Point, NY June
    • Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection, Workshop on Information Assurance and Security. West Point, NY, June 2000.
    • (2000) Workshop on Information Assurance and Security
    • Ye, N.1
  • 6
    • 0035402112 scopus 로고    scopus 로고
    • Probabilistic techniques for intrusion detection based on computer audit data
    • Man, and Cybernetics ?Part A: Systems and Humans, July
    • Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu, Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data, IEEE Transactions on Systems, Man, and Cybernetics ?Part A: Systems and Humans. 31(4):266-274, July 2001
    • (2001) IEEE Transactions on Systems , vol.31 , Issue.4 , pp. 266-274
    • Ye, N.1    Li, X.2    Chen, Q.3    Masum Emran, S.4    Xu, M.5
  • 7
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the markov-chain model for cyber-Attack detection
    • March
    • Nong Ye, Yebin Zhang, Connie M. Borror, Robustness of the Markov-Chain Model for Cyber-Attack Detection, IEEE Transactions on Realiability. 53(1):116-123, March 2004
    • (2004) IEEE Transactions on Realiability , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 9
    • 0035616570 scopus 로고    scopus 로고
    • A hybrid high-order markov chain model for computer intrusion detection
    • Wen-Hua Ju, Yehuda Vardi, A Hybrid High-Order Markov Chain Model for Computer Intrusion Detection, Journal of Computational and Graphical Statistics. 10(2): 277-295, 2001
    • (2001) Journal of Computational and Graphical Statistics , vol.10 , Issue.2 , pp. 277-295
    • Ju, W.1    Vardi, Y.2
  • 10
    • 56549097799 scopus 로고    scopus 로고
    • High-order markov kernels for intrusion detection
    • Chuanhuan Yin, Shengfeng Tian, Shaomin Mua, High-order Markov kernels for intrusion detection, Neurocomputing. 71(16-18):3247-3252, 2008
    • (2008) Neurocomputing , vol.71 , Issue.16-18 , pp. 3247-3252
    • Yin, C.1    Tian, S.2    Mua, S.3
  • 11
    • 85015374090 scopus 로고    scopus 로고
    • Modelling rain risk: A multi-order markov chain model approach
    • Markus Stowasser, Modelling Rain Risk: A Multi-order Markov Chain Model Approach, The Journal of Risk Finance, 13(1):45-60, 2011
    • (2011) The Journal of Risk Finance , vol.13 , Issue.1 , pp. 45-60
    • Stowasser, M.1
  • 14
    • 33750333036 scopus 로고    scopus 로고
    • Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
    • Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data, Computers & Security. 25(7): 539-550, 2006
    • (2006) Computers & Security , vol.25 , Issue.7 , pp. 539-550
    • Wang, W.1    Guan, X.2    Zhang, X.3    Yang, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.