Gao et al., 2002 - Google Patents
Hmms (hidden markov models) based on anomaly intrusion detection methodGao et al., 2002
- Document ID
- 17200751872075493733
- Author
- Gao B
- Ma H
- Yang Y
- Publication year
- Publication venue
- Proceedings. International Conference on Machine Learning and Cybernetics
External Links
Snippet
In this paper we discuss our research in developing anomaly detecting method for intrusion detection. The key idea is to use HMMs (Hidden Markov models) to learn the (normal and abnormal) patterns of Unix processes. These patterns can be used to detect anomalies and …
- 238000001514 detection method 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
- G06N3/04—Architectures, e.g. interconnection topology
- G06N3/0472—Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gao et al. | Hmms (hidden markov models) based on anomaly intrusion detection method | |
Khan et al. | Malicious insider attack detection in IoTs using data analytics | |
Pusara et al. | User re-authentication via mouse movements | |
Biermann et al. | A comparison of intrusion detection systems | |
Cao et al. | Machine learning to detect anomalies in web log analysis | |
US6963983B2 (en) | Method of and system for detecting an anomalous operation of a computer system | |
Yu | A survey of anomaly intrusion detection techniques | |
Asaka et al. | A new intrusion detection method based on discriminant analysis | |
CN111641634A (en) | Honey net based active defense system and method for industrial control network | |
CN118449781B (en) | Cross-border abnormal data flow identification method and device based on atypical behavior analysis | |
Du et al. | A hidden Markov models-based anomaly intrusion detection method | |
Freeman et al. | Host-based intrusion detection using user signatures | |
Nalavade et al. | Finding frequent itemsets using apriori algorithm to detect intrusions in large dataset | |
Mechtri et al. | Intrusion detection using principal component analysis | |
Yin et al. | A new intrusion detection method based on behavioral model | |
Raman et al. | A hybrid method to intrusion detection systems using HMM | |
Dhakar et al. | A new model for intrusion detection based on reduced error pruning technique | |
Kershaw et al. | Anomaly-based network intrusion detection using outlier subspace analysis: A case study | |
Park et al. | A similarity based technique for detecting malicious executable files for computer forensics | |
Cabrera et al. | Extracting precursor rules from time series-a classical statistical viewpoint | |
Varghese et al. | Process profiling using frequencies of system calls | |
Zeng et al. | A new anomaly detection method based on rough set reduction and HMM | |
Al Balawi et al. | Generative AI for Advanced Malware Detection | |
Yu | Anomaly intrusion detection based upon an artificial immunity model | |
CN119276575B (en) | Artificial intelligence-based network security automatic warning method, device and electronic equipment |