Detecting Masqueraders Using High Frequency Commands as Signatures
暂无分享,去创建一个
Shou-Hsuan Stephen Huang | Han-Ching Wu | James Marshall | Ying-Wei Kuo | Ming Dong Wan | S. S. Huang | Han-Ching Wu | M. Wan | Ying-Wei Kuo | James Marshall
[1] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[3] Kazuhiko Kato,et al. Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix , 2004, RAID.
[4] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[5] Xiangliang Zhang,et al. Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[6] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Matthias Schonlau,et al. Detecting masquerades in intrusion detection based on unpopular commands , 2000, Inf. Process. Lett..