Information-theoretic measures for anomaly detection
- 13 November 2002
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 10 references indexed in Scilit:
- Detecting intrusions using system calls: alternative data modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Haystack: an intrusion detection systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A sense of self for Unix processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Benchmarking anomaly-based detection systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Elements of Information TheoryPublished by Wiley ,2001
- Intrusion Detection Using Variable-Length Audit Trail PatternsLecture Notes in Computer Science, 2000
- Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection EvaluationLecture Notes in Computer Science, 2000
- Temporal sequence learning and data reduction for anomaly detectionPublished by Association for Computing Machinery (ACM) ,1998
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Fast Effective Rule InductionPublished by Elsevier BV ,1995