Efficient anomaly detection by modeling privilege flows using hidden Markov model

作者: Sung-Bae Cho , Hyuk-Jang Park

DOI: 10.1016/S0167-4048(03)00112-3

关键词:

摘要: … is generated out of each model. In this paper, we have utilized hidden Markov model. An HMM is a doubly stochastic process with an underlying stochastic process that is not observable…

参考文章(14)
G.E. Liepens, H.S. Vaccaro, Intrusion detection: Its role and validation Computers & Security. ,vol. 11, pp. 347- 355 ,(1992) , 10.1016/0167-4048(92)90175-Q
Jongho Choy, Sung-Bae Cho, Intrusion detection by combining multiple hidden Markov models pacific rim international conference on artificial intelligence. pp. 829- 829 ,(2000) , 10.1007/3-540-44533-1_118
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
Judith Hochberg, Kathleen Jackson, Cathy Stallings, J.F. McClary, David DuBois, Josephine Ford, NADIR: An automated system for detecting network intrusion and misuse Computers & Security. ,vol. 12, pp. 235- 248 ,(1993) , 10.1016/0167-4048(93)90110-Q
Steven A. Hofmeyr, Stephanie Forrest, Architecture for an Artificial Immune System Evolutionary Computation. ,vol. 8, pp. 443- 473 ,(2000) , 10.1162/106365600568257
Dit-Yan Yeung, Yuxin Ding, Host-based intrusion detection using dynamic and static behavioral models Pattern Recognition. ,vol. 36, pp. 229- 243 ,(2003) , 10.1016/S0031-3203(02)00026-2
S.E. Smaha, Haystack: an intrusion detection system annual computer security applications conference. pp. 37- 44 ,(1988) , 10.1109/ACSAC.1988.113412
L. Rabiner, B. Juang, An introduction to hidden Markov models IEEE ASSP Magazine. ,vol. 3, pp. 4- 16 ,(1986) , 10.1109/MASSP.1986.1165342
H.S. Vaccaro, G.E. Liepins, Detection of anomalous computer session activity ieee symposium on security and privacy. pp. 280- 289 ,(1989) , 10.1109/SECPRI.1989.36302
L.R. Rabiner, A tutorial on hidden Markov models and selected applications in speech recognition Proceedings of the IEEE. ,vol. 77, pp. 267- 296 ,(1989) , 10.1109/5.18626