[go: up one dir, main page]

Gao et al., 2002 - Google Patents

Hmms (hidden markov models) based on anomaly intrusion detection method

Gao et al., 2002

Document ID
17200751872075493733
Author
Gao B
Ma H
Yang Y
Publication year
Publication venue
Proceedings. International Conference on Machine Learning and Cybernetics

External Links

Snippet

In this paper we discuss our research in developing anomaly detecting method for intrusion detection. The key idea is to use HMMs (Hidden Markov models) to learn the (normal and abnormal) patterns of Unix processes. These patterns can be used to detect anomalies and …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models
    • G06N3/04Architectures, e.g. interconnection topology
    • G06N3/0472Architectures, e.g. interconnection topology using probabilistic elements, e.g. p-rams, stochastic processors

Similar Documents

Publication Publication Date Title
Gao et al. Hmms (hidden markov models) based on anomaly intrusion detection method
Khan et al. Malicious insider attack detection in IoTs using data analytics
Pusara et al. User re-authentication via mouse movements
Biermann et al. A comparison of intrusion detection systems
Cao et al. Machine learning to detect anomalies in web log analysis
US6963983B2 (en) Method of and system for detecting an anomalous operation of a computer system
Yu A survey of anomaly intrusion detection techniques
Asaka et al. A new intrusion detection method based on discriminant analysis
CN111641634A (en) Honey net based active defense system and method for industrial control network
CN118449781B (en) Cross-border abnormal data flow identification method and device based on atypical behavior analysis
Du et al. A hidden Markov models-based anomaly intrusion detection method
Freeman et al. Host-based intrusion detection using user signatures
Nalavade et al. Finding frequent itemsets using apriori algorithm to detect intrusions in large dataset
Mechtri et al. Intrusion detection using principal component analysis
Yin et al. A new intrusion detection method based on behavioral model
Raman et al. A hybrid method to intrusion detection systems using HMM
Dhakar et al. A new model for intrusion detection based on reduced error pruning technique
Kershaw et al. Anomaly-based network intrusion detection using outlier subspace analysis: A case study
Park et al. A similarity based technique for detecting malicious executable files for computer forensics
Cabrera et al. Extracting precursor rules from time series-a classical statistical viewpoint
Varghese et al. Process profiling using frequencies of system calls
Zeng et al. A new anomaly detection method based on rough set reduction and HMM
Al Balawi et al. Generative AI for Advanced Malware Detection
Yu Anomaly intrusion detection based upon an artificial immunity model
CN119276575B (en) Artificial intelligence-based network security automatic warning method, device and electronic equipment