Journal of Engineering and Applied Sciences
Year:
2017
Volume:
12
Issue:
3 SI
Page No.
6514 - 6518
Empirical Analysis of Effective Misuse Intrusion Detection by
Trace Classification using Conditional Random Fields
Authors :
Kyung-Hwan Cha
and
Dae-Ki Kang
References
De La Briandais, R., 1959. File searching using variable length keys. Proceedings of the Conference on Western Joint Computer, March 3-5, 1959, ACM, San Francisco, California, pp: 295-298.
Forrest, S., A.S. Perelson, L. Allen and R. Cherukuri, 1994. Self-nonself discrimination in a computer. Proceedings of the IEEE Computer Society Symposium on Security and Privacy, May 16-18, 1994, Oakland, CA, USA., pp: 202-212.
Fredkin, E., 1960. Trie memory. Commun. ACM., 3: 490-499.
CrossRef | Direct Link | Kang, D.K. and P. Kang, 2012. Intrusion trace classification using inter-element dependency models with k-truncated generalized suffix tree. Intl. J. Secur. Appl., 6: 385-390.
Direct Link | Kang, D.K., D. Fuller and V. Honavar, 2005. Learning classifiers for misuse and anomaly detection using a bag of system calls representation. Proceedings of the 6th Annual IEEE SMC Workshop on Information Assurance (IAW'05), June 15-17, 2005, IEEE, West Point, New York, ISBN:0-7803-9290-6, pp: 118-125.
Lafferty, J., A. McCallum and F. Pereira, 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. Proceedings of the Eighteenth International Conference on Machine Learning ICML, June 28-July 2, 2001, ACM, San Francisco, California, USA, ISBN: 1-55860-778-1, pp: 282-289.
Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.
Liao, Y. and V.R. Vemuri, 2002. Using text categorization techniques for intrusion detection. Proceedings of the 11th Symposium on USENIX Security Vol. 12, August 5-9, 2002, USENIX Association, San Francisco, California, pp: 51-59.
Liu, A., C. Martin, T. Hetherington and S. Matzner, 2005. A comparison of system call feature representations for insider threat detection. Proceedings from the 6th Annual IEEE SMC Workshop on Information Assurance (IAW'05), June 15-17, 2005, IEEE, West Point, New York, ISBN:0-7803-9290-6, pp: 340-347.
Peng, F. and D. Schuurmans, 2003. Combining naive Bayes and n-gram language models for text classification. Proceedings of the 25th European Conference on IR Research (ECIR’03) Vol. 2633, April 14-16, 2003, Springer, Pisa, Italy, pp: 335-350.
Rieck, K. and P. Laskov, 2006. Detecting unknown network attacks using language models. Proceedings of the 3rd International Conference on Detection of Intrusions and Malware and Vulnerability Assessment, July 13-14, 2006, Springer, Berlin, Germany, pp: 74-90.
Silvescu, A., C. Andorf, D. Dobbs and V. Honavar, 2004. Inter-element dependency models for sequence classification. MSC Thesis, University of Io2wa, Iowa, USA.
Vapnik, V.N., 2000. The Nature of Statistical Learning Theory. 2nd Edn., Springer, New York, USA., ISBN: 9780387987804, Pages: 314.
Warrender, C., S. Forrest and B.A. Pearlmutter, 1999. Detecting intrusions using system calls: Alternative data models. Proceedings of the Symposium on Security and Privacy, May 9-12, 1999, Oakland, CA., USA., pp: 133-145.