Publication | Closed Access
Anomaly intrusion detection method based on HMM
164
Citations
1
References
2002
Year
Anomaly DetectionEngineeringInformation SecuritySoftware AnalysisFormal VerificationHardware SecurityData MiningPattern RecognitionUnix Privileged ProcessIntrusion Detection SystemThreat DetectionOutlier DetectionKnowledge DiscoveryIntrusion ToleranceOperating System SecurityState Transition SequencesComputer ScienceSystem Call TraceProgram AnalysisIntrusion Detection
An anomaly intrusion detection method based on HMM is presented. The system call trace of a UNIX privileged process is passed to a HMM to obtain state transition sequences. Preliminary experiments prove the state transition sequences can express the different mode between normal action and intrusion behaviour in a more stable and simple manner.
| Year | Citations | |
|---|---|---|
Page 1
Page 1