Rule-based integration of multiple measure-models for effective intrusion detection

SJ Han, SB Cho - … Theme-System Security and Assurance (Cat …, 2003 - ieeexplore.ieee.org
As the reliance on computers increases, security of critical computers becomes more
important. An IDS detects unauthorized usage and misuse by a local user as well as …

Detecting intrusion with rule-based integration of multiple models

SJ Han, SB Cho - Computers & Security, 2003 - Elsevier
As the information technology grows interests in the intrusion detection system (IDS), which
detects unauthorized usage, misuse by a local user and modification of important data, has …

Combining multiple host-based detectors using decision tree

SJ Han, SB Cho - AI 2003: Advances in Artificial Intelligence: 16th …, 2003 - Springer
As the information technology grows interests in the intrusion detection system (IDS), which
detects unauthorized usage, misuse by a local user and modification of important data, have …

Anomaly detection of computer usage using artificial intelligence techniques

J Choy, SB Cho - Pacific Rim International Conference on Artificial …, 2000 - Springer
Intrusion detection systems (IDS) aim to detect attacks against computer systems by
monitoring the behavior of users, networks, or computer systems. Attacks against computer …

Host-based intrusion detection using dynamic and static behavioral models

DY Yeung, Y Ding - Pattern recognition, 2003 - Elsevier
Intrusion detection has emerged as an important approach to network security. In this paper,
we adopt an anomaly detection approach by detecting possible intrusions based on …

A survey of anomaly intrusion detection techniques

Y Yu - Journal of Computing Sciences in Colleges, 2012 - dl.acm.org
Intrusion detection systems are based on two fundamental approaches: the detection of
anomalous behavior as it deviates from normal behavior, and misuse detection by …

A new intrusion detection method based on behavioral model

Q Yin, L Shen, R Zhang, X Li - Fifth World Congress on …, 2004 - ieeexplore.ieee.org
Intrusion detection has emerged as an important approach to network security. A new
method for anomaly intrusion detection is proposed based on linear prediction and Markov …

User profiling for intrusion detection using dynamic and static behavioral models

DY Yeung, Y Ding - Pacific-Asia Conference on Knowledge Discovery and …, 2002 - Springer
Intrusion detection has emerged as an important approach to network security. In this paper,
we adopt an anomaly detection approach by detecting possible intrusions based on user …

Intrusion detection by combining multiple hidden Markov models

J Choy, SB Cho - PRICAI 2000 Topics in Artificial Intelligence: 6th Pacific …, 2000 - Springer
Intrusion detection techniques can be divided into two groups according to the type of
information they use: misuse detection and anomaly detection. Anomaly detection models …

A hidden Markov models-based anomaly intrusion detection method

Y Du, H Wang, Y Pang - … Control and Automation (IEEE Cat. No …, 2004 - ieeexplore.ieee.org
Intrusion detection has emerged as an important approach to security problems. The
existing techniques are analyzed, and then an effective anomaly detection method based on …