[PDF][PDF] Markov Chains, Classifiers, and Intrusion Detection.

pages.cs.wisc.edu
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

Markov Chains, Classifiers, and Intrusion Detection

S Jha, K Tan, R Maxion - csl.sri.com
Pattern based IDS• maintain a table T of anomalous patterns• if trace of system activity
matches one of the patterns in T, raise an alarm• pattern to monitor content on port 80 alert …

Markov Chains, Classifiers, and Intrusion Detection

S Jha, K Tan, RA Maxion - Proceedings of the 14th IEEE workshop on …, 2001 - dl.acm.org
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

[引用][C] Markov chains, classifiers, and intrusion detection

S Jha, K Tan, RA Maxion - Proceedings. 14th IEEE Computer …, 2001 - ieeexplore.ieee.org
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

[PDF][PDF] Markov Chains, Classifiers, and Intrusion Detection

S Jha, K Tan, RA Maxion - scholar.archive.org
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

[PDF][PDF] Markov Chains, Classifiers, and Intrusion Detection

S Jha, K Tan, RA Maxion - pages.cs.wisc.edu
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

Markov chains, classifiers, and intrusion detection

S Jha, K Tan, RA Maxion - Proceedings 14th IEEE Computer Security …, 2001 - computer.org
This work presents a technique for computing dense disparity maps from a binocular stereo
camera system. The methods are applied in an Augmented Reality setting for combining …

Markov Chains, Classifiers, and Intrusion Detection

S Jha, K Tan, R Maxion - csl.sri.com
Pattern based IDS• maintain a table T of anomalous patterns• if trace of system activity
matches one of the patterns in T, raise an alarm• pattern to monitor content on port 80 alert …