Learning Program Behavior Profiles for Intrusion Detection
暂无分享,去创建一个
[1] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[2] Richard A. Kemmerer,et al. Penetration state transition analysis: A rule-based intrusion detection approach , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[3] T. Lunt. A Real-Time Intrusion Detection Expert System (IDES)-Final Report , 1992 .
[4] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Karl N. Levitt,et al. Automated detection of vulnerabilities in privileged programs by execution monitoring , 1994, Tenth Annual Computer Security Applications Conference.
[6] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[7] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[8] William W. Cohen. Fast Eeective Rule Induction , 1995 .
[9] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[10] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[11] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[12] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[13] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[14] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[15] Steven A. Hofmeyr,et al. Intrusion Detection via System Call Traces , 1997, IEEE Softw..
[16] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[17] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[18] Mark E. Segal,et al. A Specification-Based Approach for Building Survivable Systems , 1998 .
[19] James Cannady,et al. Artificial Neural Networks for Misuse Detection , 1998 .
[20] D. Endler,et al. Intrusion detection. Applying machine learning to Solaris audit data , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[21] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .