메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 152-163

Finding the vocabulary of program behavior data for anomaly detection

Author keywords

Data analysis; Detectors; Filtering; Information analysis; Information systems; Intrusion detection; Monitoring; Object detection; Performance analysis; Vocabulary

Indexed keywords

DATA REDUCTION; DETECTORS; DISTRIBUTED COMPUTER SYSTEMS; FILTRATION; INFORMATION ANALYSIS; INFORMATION SYSTEMS; INTRUSION DETECTION; MERCURY (METAL); MONITORING; OBJECT DETECTION;

EID: 84942248748     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194881     Document Type: Conference Paper
Times cited : (15)

References (27)
  • 6
    • 85036529638 scopus 로고    scopus 로고
    • Intrusion detection: Applying machine learning to solaris audit data
    • Los Alamitos, CA, December IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ
    • D. Endler. Intrusion detection: Applying machine learning to solaris audit data. In Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98), pages 268-279, Los Alamitos, CA, December 1998. IEEE Computer Society, IEEE Computer Society Press. Scottsdale, AZ.
    • (1998) Proceedings of the 1998 Annual Computer Security Applications Conference (ACSAC'98) , pp. 268-279
    • Endler, D.1
  • 16
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. Lunt. A survey of intrusion detection techniques. Computers and Security, 12:405-418, 1993.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.1
  • 19
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length N-grams
    • C. Marceau. Characterizing the behavior of a program using multiple-length N-grams. In Proceedings of the 2000 new security paradigm workshop, pages 101-110, 2000.
    • (2000) Proceedings of the 2000 New Security Paradigm Workshop , pp. 101-110
    • Marceau, C.1
  • 20
    • 0016942292 scopus 로고
    • A space-economic suffix tree construction algorithm
    • Apr.
    • E. M. McCreight. A space-economic suffix tree construction algorithm. Jrnl. A.C.M., 23(2):262-272, Apr. 1976.
    • (1976) Jrnl. A.C.M. , vol.23 , Issue.2 , pp. 262-272
    • McCreight, E.M.1
  • 21
    • 0035678269 scopus 로고    scopus 로고
    • Generating software test data by evolution
    • C. C. Michael and G. E. McGraw. Generating software test data by evolution. IEEE TSE, 27(9):1085-1110, 2001.
    • (2001) IEEE TSE , vol.27 , Issue.9 , pp. 1085-1110
    • Michael, C.C.1    McGraw, G.E.2
  • 24
    • 84877356901 scopus 로고    scopus 로고
    • Simple and flexible detection of contiguous repeats using a suffix tree
    • Proc. 9th Annual Conference on Combinatorial Pattern Matching, Springer-verlag
    • J. Stoye and D. Gusfield. Simple and flexible detection of contiguous repeats using a suffix tree. In Proc. 9th Annual Conference on Combinatorial Pattern Matching, volume 1448 of Lecture Notes in Computer Science, pages 140-152. Springer-verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1448 , pp. 140-152
    • Stoye, J.1    Gusfield, D.2
  • 25
    • 20444449341 scopus 로고    scopus 로고
    • Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
    • K. M. C. Tan and R. A. Maxion. Why 6? defining the operational limits of stide, an anomaly-based intrusion detector. In IEEE Symposium on Security and Privacy, pages 12-15, 2002.
    • (2002) IEEE Symposium on Security and Privacy , pp. 12-15
    • Tan, K.M.C.1    Maxion, R.A.2
  • 26
    • 0006455454 scopus 로고
    • Constructing suffixtreeson-lineinlineartime
    • J. van Leeuwen, editor, Algorithms, Software, Architecture, Amsterdam, The Netherlands, Sept. Elsevier Science Publishers
    • E. Ukkonen. Constructing suffixtreeson-lineinlineartime. In J. van Leeuwen, editor, Proceedings of the IFIP 12th World Computer Congress. Volume 1: Algorithms, Software, Architecture, pages 484-492, Amsterdam, The Netherlands, Sept. 1992. Elsevier Science Publishers.
    • (1992) Proceedings of the IFIP 12th World Computer Congress , vol.1 , pp. 484-492
    • Ukkonen, E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.