期刊文献+

一种基于隐Markov模型的异常检测技术 被引量:3

Anomaly detection technique based on hidden Markov model
在线阅读 下载PDF
导出
摘要 给出了一种建立隐Markov异常检测模型的算法,并从序列支持度分析、序列预测两个方面研究了该模型在异常检测中的应用,通过实验,分析了影响这一检测方法效果和效率的因素。实验表明,该方法能在不需要任何安全方面背景知识的情况下,有效地检测出入侵行为。 An algorithm was given to making a kind of HMM(Hidden Markov Model) for anomaly detection. The application in anomaly detetction of the model was introduced from analyzing on support of sequence and sequence prediction.Factions which inflect results and efficiency were discussed by the experiments. And the experiments also show that the method can detect intrusion without any security knowledge.
出处 《计算机应用》 CSCD 北大核心 2005年第8期1744-1746,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(90104030)
关键词 异常检测 隐MARKOV模型 系统调用 滑动窗口 <Keyword>anomaly detection hidden Markov model system call slide window
  • 相关文献

参考文献6

  • 1ANDERSON JP. Computer security threat monitoring[ R]. TechnicalReport, TR80904, Washington: Anderson Co., 1980.
  • 2DENNING DE. An intrusion detection model[ J]. IEEE Transactionson Software Engineering, 1987, 13 (2): 222 - 232.
  • 3ANDERSON R, KHATLOK A. The use of information retrieval techniques for intrusion detection[ A]. Web proceedings of the First International Workshop on Recent Advances in Intrusion Detection(RAID 98) [ C]. http://www. raid - symposium. org/raid, 1998 -03.
  • 4YE N. A Markov chain model of temporal behavior for anomaly detection[ A]. Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop[ C]. http://citeseer. nj. nec. com/ye00markov. html, 2000.
  • 5WARRENDER C, FORREST S, PEARLMUTLER B. Detecting intrusions using system calls: alternative data models[ A]. Proceeding of the 1999 IEEE Symposium on Security and Privacy[ C]. CA: IEEE Computer Society, 1999. 133 - 145.
  • 6钱权,蔡庆生,安景琦.Markov链模型在异常检测上的应用研究[J].中国科学技术大学学报,2003,33(2):232-236. 被引量:1

二级参考文献1

  • 1C. Warrender, S. Forrest, B. Pearlmutler.Detecting intrusions using system calls: alternative data models [ A ]. Proceedings of the 1999 IEEE Symposium on Security and Privacy[C l, CA: IEEE Computer Society, 1999,133-145.

同被引文献14

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部