A Preliminary Attempt to Apply Detection and Estimation Theory to Intrusion Detection

作者: Stefan Axelsson

DOI:

关键词:

摘要: Research into the automated detection of computer security violations is hardly in its infancy, yet little comparison has beenmade with established field and estimation theory, results which have been found applicable to a wide range problems other disciplines. This paper attempts such comparison, studying problem intrusion by use introductory models theory. Examples are given from current situations, it concluded that there sufficient similarities between fields merit further study.

参考文章(12)
W Richard Stevens, Stephen A Rago, Dennis M Ritchie, None, Advanced Programming in the Unix Environment ,(1992)
Wenke Lee, S.J. Stolfo, K.W. Mok, A data mining framework for building intrusion detection models ieee symposium on security and privacy. pp. 120- 132 ,(1999) , 10.1109/SECPRI.1999.766909
Terran Lane, Carla E. Brodley, Temporal sequence learning and data reduction for anomaly detection computer and communications security. pp. 150- 158 ,(1998) , 10.1145/288090.288122
Stefan Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection computer and communications security. pp. 1- 7 ,(1999) , 10.1145/319709.319710
Carl E. Landwehr, Alan R. Bull, John P. McDermott, William S. Choi, A taxonomy of computer program security flaws ACM Computing Surveys. ,vol. 26, pp. 211- 254 ,(1994) , 10.1145/185403.185412
U. Lindqvist, P.A. Porras, Detecting computer and network misuse through the production-based expert system toolset (P-BEST) ieee symposium on security and privacy. pp. 146- 161 ,(1999) , 10.1109/SECPRI.1999.766911
Ulf Gustafson, Ulf Lindqvist, Erland Jonsson, Stefan Axelsson, An Approach to UNIX Security Logging 1 ,(1998)
P. Helman, G. Liepins, Statistical foundations of audit trail analysis for the detection of computer misuse IEEE Transactions on Software Engineering. ,vol. 19, pp. 886- 901 ,(1993) , 10.1109/32.241771
U. Lindqvist, E. Jonsson, How to systematically classify computer security intrusions ieee symposium on security and privacy. pp. 154- 163 ,(1997) , 10.1109/SECPRI.1997.601330