|
參考文獻 [1] Y. Ephraim, D. Malah, B. H. Juang, On the Application of Hidden Markov Models for Enhancing Noisy Speech, IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 37, no. 12, 1989. [2] S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff, A Sense of Self for Unix Processes. Proceedings of the IEEE Symposium on Security and Privacy, pp. 120-128, 1996. [3] S. A. Hofmeyr, A. Somayaji, S. Forrest, Intrusion Detection Using Sequences of System Calls, Journal of Computer Security, vol. 6, pp. 151-180, 1998. [4] A. Jones, S. Li, Temporal Signatures for Intrusion Detection, Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC) , pp. 252-261, 2001. [5] R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation, Proceedings of Conference on DARPA Information Survivability and Exposition (DISCEX) , vol. 2, pp. 12-26, Jan, 2000. [6] R. P. Lippmann, and J. W. Haines, D. J. Fried, J. Korba, K. Das, Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp. 162-182, Springer Verlag, 2000. [7] N. McAulifle, D. Wolcott, L. Schaefer, N. Kelem, B. Hubbard, T. Haley, Is your computer being misused, A survey of current intrusion detection system technology, Proceedings of the Sixth Conference on Computer Security Applications, pp. 260-272, 1990. [8] B. Mukherjee, L. T. Heberlein, and K. N. Levitt, Network Intrusion Detection, IEEE Network, vol. 8, issue 3, pp. 26-41, May-June 1994. [9] Y. Qiao, X. W. Xin, Y. Bin. S . Ge, Anomaly Intrusion Detection Method Based on HMM, Electronics Letters, vol. 38, no.13, pp. 663-664, 2002. [10] I. Sanches, Noise-Compensated Hidden Markov Models, IEEE Transactions on Speech and Audio, vol. 8, no. 5, 2000.
[11] Y. Shen, F. Yu, L.-F. Zhang, J.-Y. An, M.-L. Zhu, An Intrusion Detection System Based on System Call, Proceedings of the First IEEE and IFIP International Conference in Central Asia on Internet, pp. 4, 2005. [12] D. Wagner, P. Solo, Mimicry attacks on host-based intrusion detection systems , Proceedings of the 9th ACM conference on Computer and communications security, pp. 255-264, 2002. [13] L. Wang, G. Yu, G Wang, D. Wang, Method of Evolutionary Neural Network-based Intrusion Detection, Proceedings of International Conferences on Info-tech and Info-net (ICII) , vol 5, pp. 13-18, 2001. [14] Q. Yin, L. R. Shen, R. B. Zhang, X. Y. Li, H. Q. Wang, Intrusion Detection Based on Hidden Markov Model, Proceedings of the Second International Conference on Machine Learning and Cybernetics, vol. 5, pp. 3115-3118, 2003. [15] F. Yu, C. Xu, Y. Shen, J.-Y. An, L.-F. Zhang, Intrusion Detection Based on System Call Finite-State Automation Machine, Proceedings of IEEE International Conference on Industrial Technology, pp. 63-68, 2005. [16] X. Zhang, P. Fan, Z. Zhu, A New Anomaly Detection Method Based on Hierarchical HMM, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) , pp. 249-252, 2003. [17] X. Zhang, Z. Zhu, P. Fan, Intrusion Detection Based on Cross-correlation of System Call Sequences, Proceeding of the 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI) , pp. 7, 2005. [18] Smashing The Stack For Fun And Profit http://insecure.org/stf/smashstack.html [19]SNORT http://www.snort.org/ [20] Strace http://sourceforge.net/projects/strace/ [21] TFN http://staff.washington.edu/dittrich/misc/tfn.analysis [22] Zero-day Attack http://en.wikipedia.org/wiki/Zero_day_attack
|