Markov chains in network intrusion detection

被引:5
|
作者
Hixon, R [1 ]
Gruenbacher, DA [1 ]
机构
[1] Wichita State Univ, Wichita, KS 67260 USA
关键词
D O I
10.1109/IAW.2004.1437849
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:432 / 433
页数:2
相关论文
共 50 条
  • [21] Counselors network for intrusion detection
    Quincozes, Silvio E.
    Raniery, Carlos
    Nunes, Raul Ceretta
    Albuquerque, Celio
    Passos, Diego
    Mosse, Daniel
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2021, 31 (03)
  • [22] Estimation of Hidden Markov Chains by a Neural Network
    Ito, Yoshifusa
    Izumi, Hiroyuki
    Srinivasan, Cidambi
    [J]. NEURAL INFORMATION PROCESSING (ICONIP 2014), PT I, 2014, 8834 : 602 - 609
  • [23] On Continuum Limits of Markov Chains and Network Modeling
    Zhang, Yang
    Chong, Edwin K. P.
    Hannig, Jan
    Estep, Donald
    [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 6779 - 6784
  • [24] Performance of a crossbar network using Markov chains
    Benazzouz, D
    Farah, A
    [J]. ESM 2003: 17TH EUROPEAN SIMULATION MULTICONFERENCE: FOUNDATIONS FOR SUCCESSFUL MODELLING & SIMULATION, 2003, : 205 - 210
  • [25] Estimation of hidden markov chains by a neural network
    [J]. Ito, Yoshifusa (ito@aichi-med-u.ac.jp), 1600, Springer Verlag (8834):
  • [26] The sound of intrusion: A novel network intrusion detection system
    Aldarwbi, Mohammed Y.
    Lashkari, Arash H.
    Ghorbani, Ali A.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 104
  • [27] High-order Markov kernels for intrusion detection
    Yin, Chuanhuan
    Tian, Shengfeng
    Mu, Shaomin
    [J]. NEUROCOMPUTING, 2008, 71 (16-18) : 3247 - 3252
  • [28] The prediction role of Hidden Markov Model in Intrusion Detection
    Gao, F
    Sun, J
    Wei, Z
    [J]. CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 893 - 896
  • [29] Hidden Markov Model Based Anomaly Intrusion Detection
    Jain, Ruchi
    Abouzakhar, Nasser S.
    [J]. 2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 528 - 533
  • [30] Recurrent network in Network Intrusion Detection System
    Xue, JS
    Sun, JZ
    Zhang, X
    [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2676 - 2679