Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 조동섭 | * |
dc.date.accessioned | 2016-08-28T11:08:15Z | - |
dc.date.available | 2016-08-28T11:08:15Z | - |
dc.date.issued | 2004 | * |
dc.identifier.isbn | 1932415378 | * |
dc.identifier.isbn | 9781932415377 | * |
dc.identifier.other | OAK-12698 | * |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/228782 | - |
dc.description.abstract | Most of the current network intrusion detection schemes are based on knowledge created through humans' interpretation. This kind of approaches are not capable to detect unknown intrusions. Herein, to overcome that limitation, we propose an intelligent intrusion detection scheme that doesn't depend on humans' analysis. Understanding intrusions as processes that make the host system's computing and network resources unavailable, it can be possible to identify unknown intrusions without pre-knowledge on that by predicting host system's resource usage trend. In this paper, we develop a model describable of host system's status in aspect of host resources availability and use that model to predict host system's future status according to network traffic flow. | * |
dc.description.sponsorship | Comput. Sci. Res., Education, and Applications Press (CSREA);International Technology Institute (ITI);Korean Society for Internet Information (KSII);World Academy of Science for Information Technology (WAS) | * |
dc.language | English | * |
dc.title | Modeling host status transition for network intrusion detection | * |
dc.type | Conference Paper | * |
dc.relation.index | SCOPUS | * |
dc.relation.startpage | 421 | * |
dc.relation.lastpage | 426 | * |
dc.relation.journaltitle | Proceedings of the International Conference on Security and Management, SAM'04 | * |
dc.identifier.scopusid | 2-s2.0-12244285295 | * |
dc.author.google | Kwak M. | * |
dc.author.google | Cho D.-S. | * |
dc.contributor.scopusid | 조동섭(7401737863) | * |
dc.date.modifydate | 20240322133106 | * |