scispace - formally typeset
Open AccessJournal ArticleDOI

Host-based intrusion detection using dynamic and static behavioral models

Dit-Yan Yeung, +1 more
- 01 Jan 2003 - 
- Vol. 36, Iss: 1, pp 229-243
Reads0
Chats0
TLDR
This paper adopts an anomaly detection approach by detecting possible intrusions based on program or user profiles built from normal usage data using a scheme that can be justified from the perspective of hypothesis testing.
About
This article is published in Pattern Recognition.The article was published on 2003-01-01 and is currently open access. It has received 370 citations till now. The article focuses on the topics: Intrusion detection system & Anomaly detection.

read more

Citations
More filters
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Journal ArticleDOI

Novelty detection: a review—part 1: statistical approaches

TL;DR: There are a multitude of applications where novelty detection is extremely important including signal processing, computer vision, pattern recognition, data mining, and robotics.
Journal ArticleDOI

An overview of anomaly detection techniques: Existing solutions and latest technological trends

TL;DR: This paper provides a comprehensive survey of anomaly detection systems and hybrid intrusion detection systems of the recent past and present and discusses recent technological trends in anomaly detection and identifies open problems and challenges in this area.
Journal ArticleDOI

Review: A review of novelty detection

TL;DR: This review aims to provide an updated and structured investigation of novelty detection research papers that have appeared in the machine learning literature during the last decade.
Journal ArticleDOI

A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data.

TL;DR: This paper aims to be a new well-funded basis for unsupervised anomaly detection research by publishing the source code and the datasets, and reveals the strengths and weaknesses of the different approaches for the first time.
References
More filters
Journal ArticleDOI

A tutorial on hidden Markov models and selected applications in speech recognition

TL;DR: In this paper, the authors provide an overview of the basic theory of hidden Markov models (HMMs) as originated by L.E. Baum and T. Petrie (1966) and give practical details on methods of implementation of the theory along with a description of selected applications of HMMs to distinct problems in speech recognition.
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.