期刊文献+

INTRUSION DETECTION BASED ON THE SECOND-ORDER STOCHASTIC MODEL

INTRUSION DETECTION BASED ON THE SECOND-ORDER STOCHASTIC MODEL
下载PDF
导出
摘要 This paper presents a new method based on a second-order stochastic model for computer intrusion detection.The results show that the performance of the second-order stochastic model is better than that of a first-order stochastic model.In this study,different window sizes are also used to test the performance of the model.The detection results show that the second-order stochastic model is not so sensitive to the window size,comparing with the first-order stochastic model and other previous researches.The detection result of window sizes 6 and 10 is the same. This paper presents a new method based on a second-order stochastic model for computer intrusion detection. The results show that the performance of the second-order stochastic model is better than that of a first-order stochastic model. In this study, different window sizes are also used to test the performance of the model. The detection results show that the second-order stochastic model is not so sensitive to the window size, comparing with the first-order stochastic model and other previous researches. The detection result of window sizes 6 and 10 is the same.
机构地区 School of Logistics
出处 《Journal of Electronics(China)》 2007年第5期679-685,共7页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China (No.60473030).
关键词 Second-order stochastic Intrusion detection System calls 侵入探测 随机模型 系统呼叫 通信
  • 相关文献

参考文献10

  • 1T.Escamilla.Intrusion Detection:Network Security Beyond the Firewall[]..1998 被引量:1
  • 2B.Simons.Building big brother[].ACM Commun.2000 被引量:1
  • 3P.G.Neumann.Risks of insiders[].ACM Commun.1999 被引量:1
  • 4M.Godwin.Net to worry[].A CM Commun.1999 被引量:1
  • 5S.Jajodia,P.Ammann,C.D.McCollum.Surviving information warfare attacks[].Computer.1999 被引量:1
  • 6B.H.Barnes.Computer security research:A British perspective[].IEEE Software.1998 被引量:1
  • 7A.Boulanger.Catapults and grappling hooks:The tools and techniques of information warfare[].IBM Systems Journal.1998 被引量:1
  • 8W.Lee,S.J.Stolfo.Data mining approaches for in- trusion detection[].Proceedings of the th USENIX Security Symposium.1998 被引量:1
  • 9G.Vigna,S.T.Eckmann,R.A.Kemmerer.The STAT tool suit[].Proc DARPA Information Survivability Conf& Exposition.2000 被引量:1
  • 10W.Lee,S.J.Stolfo,P.K.Chan.Learning patterns from UNIX process execution traces for intrusion detection[].AAAI Workshop on AI Approaches to Fraud Detection and Risk Management.1997 被引量:1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部