Host-based intrusion detection using dynamic and static behavioral models
From MaRDI portal
Publication:1856667
DOI10.1016/S0031-3203(02)00026-2zbMath1007.68952MaRDI QIDQ1856667
Publication date: 11 February 2003
Published in: Pattern Recognition (Search for Journal in Brave)
hidden Markov modelmaximum likelihooddata miningminimum cross entropycomputer securityprofilinganomaly detectionintrusion detectionshell commandsystem call
Related Items (7)
Probabilistic suffix models for API sequence analysis of windows XP applications ⋮ Network intrusion detection in covariance feature space ⋮ Real Time Learning of Non-stationary Processes with Dynamic Bayesian Networks ⋮ Hopf bifurcation in an Internet worm propagation model with time delay in quarantine ⋮ A host intrusion detection system architecture for embedded industrial devices ⋮ Ensemble: Community-Based Anomaly Detection for Popular Applications ⋮ Impulsive switching epidemic model with benign worm defense and quarantine strategy
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Comments on and correction to "Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy" (Jan 80 26-37) [Corresp.]
- Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy
- A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains
- On Information and Sufficiency
This page was built for publication: Host-based intrusion detection using dynamic and static behavioral models