期刊文献+

基于隐马尔科夫模型的用户行为异常检测方法 被引量:3

Method for anomaly detection of user behaviors based on hidden Markov models
下载PDF
导出
摘要 提出了一种基于HMM的用户行为异常检测的新方法,用shell命令序列作为审计数据,但在数据预处理、用户行为轮廓的表示方面与现有方法不同。仿真实验结果表明,本方法的检测效率和实时性相对较高,在检测准确率方面也有较大优势。 A method of user behavior anomaly detection was presented. The method constructs specific hidden Markov model (HMM) with shell commands as audit data. The method is different with other references on data preprocessing and representing the behavior profiles of users. The results of computer simulation show the method presented can achieve high detection accuracy and practicability.
出处 《电子技术应用》 北大核心 2011年第7期156-158,共3页 Application of Electronic Technique
关键词 入侵检测 异常检测 行为模式 隐马尔可夫模型 intrusion detection anomaly detection behavior pattern HMM
  • 相关文献

参考文献6

  • 1FORREST S, HOFMEYR S A, SOMAYAJIA. A sense of self for UNIX processes[C]. Proceedings of IEEE Sympo- sium on Security and Privacy, Los Alamos, Caliibrnia,1996.
  • 2LEE W, STOLFO S J. Data mining approaches for intru- sion detection[C].Proceedings of the 7th US ENIX Security Symposium, San Antonio, Texas, 1998.
  • 3WARRENDER C, FORREST S, PEARLMUTYER B. Det- ecting intrusions using system calls: alternative data models [C]. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 1999:133-145.
  • 4LANE T. Machine learning techniques for the computer security domain of anomaly detection[D].Purdue University 2000.
  • 5周星,彭勤科,王静波.基于两层隐马尔可夫模型的入侵检测方法[J].计算机应用研究,2008,25(3):911-914. 被引量:4
  • 6邬书跃,田新广.基于隐马尔可夫模型的用户行为异常检测新方法[J].通信学报,2007,28(4):38-43. 被引量:20

二级参考文献20

  • 1田新广,高立志,张尔扬.新的基于机器学习的入侵检测方法[J].通信学报,2006,27(6):108-114. 被引量:15
  • 2王福宏,彭勤科,李乃捷.基于不定长系统调用序列模式的入侵检测方法[J].计算机工程,2006,32(20):143-146. 被引量:2
  • 3LANE T.Machine Learning Techniques for the Computer Security Domain of Anomaly Detection[D].Purdue University,2000.
  • 4LEE W,DONG X.Information-theoretic measures for anomaly detection[A].Proceedings of the 2001 IEEE Symposium on Security and Privacy[C].Oakland,USA,2001.130-134.
  • 5LANE T,BRODLEY C E.Temporal sequence learning and data reduction for anomaly detection[J].ACM Transactions on Information and System Security,1999,2(3):295-331.
  • 6WARRENDER C,FORREST S,PEARLMUTTER B.Detecting intrusions using system calls:alternative data models[A].Proceedings the 1999 IEEE Symposium on Security and Privacy[C].Berkely,USA:IEEE Computer Society,1999.133-145.
  • 7LANE T,BRODLEY C E.An application of machine learning to anomaly detection[A].Proceedings of the 20th National Information Systems Security Conference[C].Baltimore,USA,1997.366-377.
  • 8FORREST S, HOFMEYR S A, SOMAYAJI A, et al. A sense of self for UNIX processes [ C ]//Proc of IEEE Symposium on Security and Privacy. Los Alamos, California: [ s. n ], 1996 : 120-128.
  • 9LEE W, STOLFO S J. Data mining approaches for intrusion detection [ C]//Proc of the 7th USENIX Security Symposium. San Antonio, Texas: [ s. n. ], 1998:79-94.
  • 10KOSORESOW A P, HOFMEYR S A. Intrusion detection via system call traces[J]. IEEE Software, 1997, 14(5) :35-42.

共引文献22

同被引文献29

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部