Host-Based Anomaly Intrusion Detection

作者: Jiankun Hu

DOI: 10.1007/978-3-642-04117-4_13

关键词:

摘要: Network security has become an essential component of any computer network. Despite significant advances having been made on network-based intrusion prevention and detection, ongoing attacks penetrating mechanisms have reported. It is being realized that such as firewalls or detection systems (IDS) are not effective in detecting certain insider without generating network traffic. The trend will be to merge host-based IDS (HIDS) networkbased (NIDS). This chapter provide the fundamentals anomaly well their developments. A new architectural framework proposed for intelligent integration multiple engines. novelty this it provides a feedback loop so one output from engine can used input another engine. also illustrated how several schemes derived framework. New research topics future discussed.

参考文章(29)
Jiankun Hu, Peter Bertok, Zahir Tari, None, Taxonomy and framework for integrating dependability and security Information Assurance#R##N#Dependability and Security in Networked Systems. pp. 149- 170 ,(2008) , 10.1016/B978-012373566-9.50008-2
Peter Bertók, Xuan Dau Hoang, Jiankun Hu, Intrusion Detection Based on Data Mining. international conference on enterprise information systems. pp. 341- 346 ,(2003)
Jose Garrido, Richard Schlesinger, Principles of Modern Operating Systems ,(2011)
Andrew S. Tanenbaum, Computer networks (3rd ed.) Prentice-Hall, Inc.. ,(1996)
Xuan Dau Hoang, Jiankun Hu, P. Bertok, A multi-layer model for anomaly intrusion detection using program sequences of system calls international conference on networks. pp. 531- 536 ,(2003) , 10.1109/ICON.2003.1266245
Wenke Lee, Salvatore J. Stolfo, Data mining approaches for intrusion detection usenix security symposium. pp. 6- 6 ,(1998) , 10.21236/ADA401496
Prashant Krishnamurthy, David Tipper, Yi Qian, James Joshi, Information Assurance: Dependability and Security in Networked Systems Morgan Kaufmann Publishers Inc.. ,(2007)
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji, Intrusion detection using sequences of system calls Journal of Computer Security. ,vol. 6, pp. 151- 180 ,(1998) , 10.3233/JCS-980109
Jean-Luc Gauvain, Chin-Hui Lee, Bayesian learning of Gaussian mixture densities for hidden Markov models human language technology. pp. 272- 277 ,(1991) , 10.3115/112405.112457