Host-Based Anomaly Intrusion Detection
- 1 January 2010
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detectionIEEE Network, 2009
- On Scalable Attack Detection in the NetworkIEEE/ACM Transactions on Networking, 2007
- An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system callsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Detecting intrusions using system calls: alternative data modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A sense of self for Unix processesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A framework for constructing features and models for intrusion detection systemsACM Transactions on Information and System Security, 2000
- Intrusion detection using sequences of system callsJournal of Computer Security, 1998
- Bayesian learning of Gaussian mixture densities for hidden Markov modelsPublished by Association for Computational Linguistics (ACL) ,1991
- A tutorial on hidden Markov models and selected applications in speech recognitionProceedings of the IEEE, 1989
- An Intrusion-Detection ModelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1986