Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3 SI
Page No. 6514 - 6518

Empirical Analysis of Effective Misuse Intrusion Detection by Trace Classification using Conditional Random Fields

Authors : Kyung-Hwan Cha and Dae-Ki Kang

References

De La Briandais, R., 1959. File searching using variable length keys. Proceedings of the Conference on Western Joint Computer, March 3-5, 1959, ACM, San Francisco, California, pp: 295-298.

Forrest, S., A.S. Perelson, L. Allen and R. Cherukuri, 1994. Self-nonself discrimination in a computer. Proceedings of the IEEE Computer Society Symposium on Security and Privacy, May 16-18, 1994, Oakland, CA, USA., pp: 202-212.

Fredkin, E., 1960. Trie memory. Commun. ACM., 3: 490-499.
CrossRef  |  Direct Link  |  

Kang, D.K. and P. Kang, 2012. Intrusion trace classification using inter-element dependency models with k-truncated generalized suffix tree. Intl. J. Secur. Appl., 6: 385-390.
Direct Link  |  

Kang, D.K., D. Fuller and V. Honavar, 2005. Learning classifiers for misuse and anomaly detection using a bag of system calls representation. Proceedings of the 6th Annual IEEE SMC Workshop on Information Assurance (IAW'05), June 15-17, 2005, IEEE, West Point, New York, ISBN:0-7803-9290-6, pp: 118-125.

Lafferty, J., A. McCallum and F. Pereira, 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. Proceedings of the Eighteenth International Conference on Machine Learning ICML, June 28-July 2, 2001, ACM, San Francisco, California, USA, ISBN: 1-55860-778-1, pp: 282-289.

Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.

Liao, Y. and V.R. Vemuri, 2002. Using text categorization techniques for intrusion detection. Proceedings of the 11th Symposium on USENIX Security Vol. 12, August 5-9, 2002, USENIX Association, San Francisco, California, pp: 51-59.

Liu, A., C. Martin, T. Hetherington and S. Matzner, 2005. A comparison of system call feature representations for insider threat detection. Proceedings from the 6th Annual IEEE SMC Workshop on Information Assurance (IAW'05), June 15-17, 2005, IEEE, West Point, New York, ISBN:0-7803-9290-6, pp: 340-347.

Peng, F. and D. Schuurmans, 2003. Combining naive Bayes and n-gram language models for text classification. Proceedings of the 25th European Conference on IR Research (ECIR’03) Vol. 2633, April 14-16, 2003, Springer, Pisa, Italy, pp: 335-350.

Rieck, K. and P. Laskov, 2006. Detecting unknown network attacks using language models. Proceedings of the 3rd International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, July 13-14, 2006, Springer, Berlin, Germany, pp: 74-90.

Silvescu, A., C. Andorf, D. Dobbs and V. Honavar, 2004. Inter-element dependency models for sequence classification. MSC Thesis, University of Io2wa, Iowa, USA.

Vapnik, V.N., 2000. The Nature of Statistical Learning Theory. 2nd Edn., Springer, New York, USA., ISBN: 9780387987804, Pages: 314.

Warrender, C., S. Forrest and B.A. Pearlmutter, 1999. Detecting intrusions using system calls: Alternative data models. Proceedings of the Symposium on Security and Privacy, May 9-12, 1999, Oakland, CA., USA., pp: 133-145.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved