A Multi-order Markov Chain Based Scheme for Anomaly Detection
暂无分享,去创建一个
[1] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[2] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[3] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[4] Markus Stowasser,et al. Modelling rain risk: a multi‐order Markov chain model approach , 2011 .
[5] Salvatore J. Stolfo,et al. Learning Rules from System Call Arguments and Sequences for Anomaly 20 Detection , 2003 .
[6] Connie M. Borror,et al. Robustness of the Markov-chain model for cyber-attack detection , 2004, IEEE Transactions on Reliability.
[7] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[8] Atul Negi,et al. A Hybrid Method to Intrusion Detection Systems Using HMM , 2005, ICDCIT.
[9] Mikhail J. Atallah,et al. Markov Models for Identification of Significant Episodes , 2005, SDM.
[10] Shaomin Mu,et al. High-order Markov kernels for intrusion detection , 2008, Neurocomputing.
[11] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[12] Xiangliang Zhang,et al. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data , 2006, Comput. Secur..
[13] Yehuda Vardi,et al. A Hybrid High-Order Markov Chain Model for Computer Intrusion Detection , 2001 .
[14] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[15] S. Saravanakumar,et al. Algorithms Based on Artificial Neural Networks for Intrusion Detection in Heavy Traffic Computer Networks , 2011 .