Citation: | PENG Xin-guang, LIU Yu-shu, WU Yu-shu, YANG Yong. Classification Model with High Deviation for Intrusion Detection on System Call Traces[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2005, 14(3): 260-263. |
[1] |
Warrender C,For rest S,Pearlmutter B.Detecting intr usio ns using system calls:A lternativ e data models[A] .G ong L,R eiter M K.Proceedings of the 1999 I EEESymposium on Security and Privacy[C] .Oakland,CA:IEEE Computer Society Pr ess,1999.133-145.
|
[2] |
L ee W,Stolfo S,M ok K W.Data mining framework forbuilding intrusio n detect ion model[A] .G ong L,ReiterM K.Pr oceedings o f the 2001 IEEE Symposium on Security and Pr ivacy[C] .Oakland,CA:IEEE ComputerSociety Press,1999.120-132.
|
[3] |
Peng Xinguang,M i Wentao,L iu Yushu,et al.Detection engine based on host system calls for distr ibuted intrusion detection system[A] .W en T D.Proceedings oft he 5t h Internatio nal Symposium on T est and M easurement[C] .Shenzhen:I nternat ional Academic Publisher,2003.4858-4861.(in Chinese)
|
[4] |
Zhang Ku,Xu M anwu,Zhang Hong,et al.An intrusiondetection method(RHDID)based on relative hammingdistance[J] .Journal of Computers,2003,26(1):65-70.(in Chinese)
|
[5] |
R ao Xian,Dong Chunx i,Yang Shaoquan.An intrusiondetection system based on support vecto r machine[J] .Journal of Softw ar e,2003,14(4):798-803.(in Chinese)
|
[6] |
Y e N ong,Emr an Sy ed M asum,Cheng Q iang,et al.M ultivariate statistical analysis of audit trails fo r hostbased intr usion detection[J] .IEEE T r ansactions onComputers,2002,51(7):810-819.
|
[7] |
L i X iaojian,Huang Yong,Huang Houkuan.A n computing immune model based on po isson pr ocedure and roughinclusion[J] .Journal of Computers,2003,26(1):71-76.(in Chinese)
|
[8] |
Su Purui,L i Dequan,F eng Dengg uo.A host basedanomaly intrusion detect ion model based on genetic progr amming[J] .Journal of Softw are,2003,14(6):1120-1126.(in Chinese)
|