Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern

被引:0
|
作者
Duan, Xue-Tao [1 ]
Jia, Chun-Fu [1 ,2 ]
Liu, Chun-Bo [1 ]
机构
[1] College of Information Technological Science, Nankai University, Tianjin 300071, China
[2] National Computer Virus Emergency Response Center, Tianjin 300457, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:109 / 114
相关论文
共 50 条
  • [1] An Intrusion Detection Method Based on Hierarchical Hidden Markov Models
    JIA Chunfu1
    2. College of Information Technology and Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 135 - 138
  • [2] Variable-length signatures for intrusion detection
    Li, Zhuowei
    Das, Amitabha
    Zhou, Jianying
    Patra, Jagdish C.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 183 - 191
  • [3] Intrusion detection based on Hidden Markov Model
    Yin, QB
    Shen, LR
    Zhang, RB
    Li, XY
    Wang, HQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
  • [4] Hidden Markov model based intrusion detection
    Liu, Zhi-Yong
    Qiao, Hong
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 169 - 170
  • [5] Intrusion detection model based on variable-length character patterns and its simulating analysis
    Ge, Fang-Bin
    Yang, Lin
    Wang, Jian-Xin
    Zang, Lei
    Xitong Fangzhen Xuebao / Journal of System Simulation, 2008, 20 (22): : 6118 - 6121
  • [6] Predictive Tabla Modelling Using Variable-length Markov and Hidden Markov Models
    Chordia, Parag
    Sastry, Avinash
    Sentuerk, Sertan
    JOURNAL OF NEW MUSIC RESEARCH, 2011, 40 (02) : 105 - 118
  • [7] Hidden Markov Model Based Anomaly Intrusion Detection
    Jain, Ruchi
    Abouzakhar, Nasser S.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 528 - 533
  • [8] A variable-length model for masquerade detection
    Xiao, Xi
    Tian, Xinguang
    Zhai, Qibin
    Xi, Shutao
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2470 - 2478
  • [9] A systematic review on intrusion detection based on the Hidden Markov Model
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    Jafari, Abbas Javan
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (03) : 111 - 134
  • [10] Intrusion detection using variable-length audit trail patterns
    Wespi, A
    Dacier, M
    Debar, H
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2000, 1907 : 110 - 129