View : 714 Download: 0

Full metadata record

DC Field Value Language
dc.contributor.author조동섭*
dc.date.accessioned2016-08-28T11:08:15Z-
dc.date.available2016-08-28T11:08:15Z-
dc.date.issued2004*
dc.identifier.isbn1932415378*
dc.identifier.isbn9781932415377*
dc.identifier.otherOAK-12698*
dc.identifier.urihttps://dspace.ewha.ac.kr/handle/2015.oak/228782-
dc.description.abstractMost of the current network intrusion detection schemes are based on knowledge created through humans' interpretation. This kind of approaches are not capable to detect unknown intrusions. Herein, to overcome that limitation, we propose an intelligent intrusion detection scheme that doesn't depend on humans' analysis. Understanding intrusions as processes that make the host system's computing and network resources unavailable, it can be possible to identify unknown intrusions without pre-knowledge on that by predicting host system's resource usage trend. In this paper, we develop a model describable of host system's status in aspect of host resources availability and use that model to predict host system's future status according to network traffic flow.*
dc.description.sponsorshipComput. Sci. Res., Education, and Applications Press (CSREA);International Technology Institute (ITI);Korean Society for Internet Information (KSII);World Academy of Science for Information Technology (WAS)*
dc.languageEnglish*
dc.titleModeling host status transition for network intrusion detection*
dc.typeConference Paper*
dc.relation.indexSCOPUS*
dc.relation.startpage421*
dc.relation.lastpage426*
dc.relation.journaltitleProceedings of the International Conference on Security and Management, SAM'04*
dc.identifier.scopusid2-s2.0-12244285295*
dc.author.googleKwak M.*
dc.author.googleCho D.-S.*
dc.contributor.scopusid조동섭(7401737863)*
dc.date.modifydate20240322133106*
Appears in Collections:
인공지능대학 > 컴퓨터공학과 > Journal papers
Files in This Item:
There are no files associated with this item.
Export
RIS (EndNote)
XLS (Excel)
XML


qrcode

BROWSE