Sciweavers

12 search results - page 3 / 3
» Fuzzy Intrusion Detection System via Data Mining Technique w...
Sort
View
ICC
2009
IEEE
123views Communications» more  ICC 2009»
13 years 11 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
CCS
2008
ACM
13 years 7 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson