References
- R. Buschkes, M. Borning, and D. Kesdogan, 'Transaction-based Anomaly Detection,' Proc. of the Workshop on Intrusion Detection and Network monitoring, USENIX, Apr., 1999
- D. E. Denning, 'An Intrusion-Detection Model,' IEEE Trans. on Software Engineering, No.2, Feb., 1987 https://doi.org/10.1109/TSE.1987.232894
- M. Esmaili, R. Safavi-Naini, and J. Pieprzyk, 'Intrusion Detection : a Survey,' ICCC '95, pp.409-414
- A. K. Ghosh, A. S. Schwartzbard and M. Shatz, 'Learning program behavior profiles for intrusion detection,' Proc. USENIX Workshop on IDS and Network Monitoring, April 1999
- T. Kohonen, 'The Self Organizing Map,' Proc. IEEE, Vol. 78, No.9, Sep., 1990, pp.1464-1480 https://doi.org/10.1109/5.58325
- S. Kumar, Classification and Detection of Computer Intrusions, Purdue University, Aug., 1995
- T. Lane and C.E. Brodly, 'An application of machine learning to anomaly detection,' 20th NJSSC, 1997
- T. F. Lunt, 'A Survery of Intrusion Detection Techniques,' Computer & Security, Vol.12, No.4, Jun., 1993 https://doi.org/10.1016/0167-4048(93)90029-5
- A. Mounji and B. L. Charlier, 'Continuous Assessment of a Unix Configuration : Integrating Intrusion Detection and Configuration Analysis,' Symposium on Network and Distributed System Security, IEEE, Feb., 1997
- L. R. Rabiner and B. H. Juang, 'An introduction to hidden Markov models,' IEEE ASSP Magazine, 1986
- L. R. Rabiner, 'A tutorial on hidden Markov models and selected applications in speech recognition,' Proc. of the IEEE, Vol.77, No.2, 1989 https://doi.org/10.1109/5.18626
- J. Ryan, M. Lin, 'Intrusion detection with neural networks,' AAAI workshop, 1997
- M. Sebring, E. Shellhouse, M. Hanna, and R. Whitehurst, 'Expert Systems in Intrusion Detection : A Case Study,' Proc. 11th National Computer Security Conference, Oct., 1988
- C. Warrender, S. Forrest and B. Pearlmutter, 'Detecting Intrusions Using System Calls : Alternative Data Models,' The 1999 IEEE Symposium on Security and Privacy, 1999 https://doi.org/10.1109/SECPRI.1999.766910
- Nong Ye, 'A Markov Chain Model of Temporal Behavior for Anomaly Detection,' Proc. of the 2000 IEEE Workshop on Information Assurance and Security, Jun., 2000
- W. Lee and D. Xiang, 'Information-Theoretic Measures for Anomaly Detection,' The 2001 IEEE Symposium on Security and Privacy, 2001 https://doi.org/10.1109/SECPRI.2001.924294
- J. Choy, S. Cho, 'Hidden Markov Model for Sequence Recognition in Intrusion Dectection System,' Proc. IEEE ICARDT '99, 1999
- 김민수, 은유진, 노봉남, 'UNIX 환경에서 퍼지 Petri net을 이용한 호스트 기반 침입 탐지 시스템 설계', 한국정보처리학회논문지, 제6권, 제7호, 1999
- 최종호, 조성배, '비정상행위 탐지기반의 침입탐지시스템을 위한 은닉 마르코프 모델을 사용한 행위 모델링과 탐지', '99 정보보호 우수논문집, 1999