Network intrusion detection based on system calls and data mining
暂无分享,去创建一个
[1] Sun,et al. Anomaly Detection of User Behavior Based on Shell Commands and Homogeneous Markov Chains , 2008 .
[2] Xin-guang Tian,et al. A Method for Anomaly Detection of User Behaviors Based on Machine Learning , 2006 .
[3] Carla E. Brodley,et al. An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection , 2003, Machine Learning.
[4] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Won Suk Lee,et al. A Clustering-Based Anomaly Intrusion Detector for a Host Computer , 2004, IEICE Trans. Inf. Syst..
[6] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[8] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[9] Li Wenfa,et al. Intrusion detection based on system calls and homogeneous Markov chains , 2008 .
[10] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[11] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .
[12] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .