Constructing attribute weights from computer audit data for effective intrusion detection
- 31 December 2009
- journal article
- Published by Elsevier BV in Journal of Systems and Software
- Vol. 82 (12), 1974-1981
- https://doi.org/10.1016/j.jss.2009.06.040
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Fast intrusion detection based on a non-negative matrix factorization modelJournal of Network and Computer Applications, 2009
- Processing of massive audit data streams for real-time anomaly intrusion detectionComputer Communications, 2008
- Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit dataComputers & Security, 2006
- Application of SVM and ANN for intrusion detectionComputers & Operations Research, 2005
- Application of online-training SVMs for real-time intrusion detection with different considerationsComputer Communications, 2005
- Host-based intrusion detection using dynamic and static behavioral modelsPattern Recognition, 2003
- Probabilistic techniques for intrusion detection based on computer audit dataIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001
- Computer Intrusion: Detecting MasqueradesStatistical Science, 2001
- Detecting masquerades in intrusion detection based on unpopular commandsInformation Processing Letters, 2000
- The base-rate fallacy and the difficulty of intrusion detectionACM Transactions on Information and System Security, 2000