Detecting anomalous and unknown intrusions against programs

作者: A.K. Ghosh , J. Wanken , F. Charron

DOI: 10.1109/CSAC.1998.738646

关键词:

摘要: The ubiquity of the Internet connection to desktops has been both a boon to business as well as a cause for concern for the security of digital assets that may be unknowingly exposed …

参考文章(7)
Terran Lane, Carla E Brodley, An Application of Machine Learning to Anomaly Detection ,(1999)
Teresa F. Lunt, A survey of intrusion detection techniques Computers & Security. ,vol. 12, pp. 405- 418 ,(1993) , 10.1016/0167-4048(93)90029-5
A.K. Jain, Jianchang Mao, K.M. Mohiuddin, Artificial neural networks: a tutorial computational science and engineering. ,vol. 29, pp. 31- 44 ,(1996) , 10.1109/2.485891
Fabian Monrose, Aviel Rubin, Authentication via keystroke dynamics computer and communications security. pp. 48- 56 ,(1997) , 10.1145/266420.266434
P.A. Porras, R.A. Kemmerer, Penetration state transition analysis: A rule-based intrusion detection approach annual computer security applications conference. pp. 220- 229 ,(1992) , 10.1109/CSAC.1992.228217
T.F. Lunt, R. Jagannathan, A prototype real-time intrusion-detection expert system ieee symposium on security and privacy. pp. 59- 66 ,(1988) , 10.1109/SECPRI.1988.8098
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Computer immunology Communications of The ACM. ,vol. 40, pp. 88- 96 ,(1997) , 10.1145/262793.262811