This paper addresses the task of detecting intrusions in the form of malicious programs on a host computer system by inspecting the trace of system calls made by these programs. We use "attack-tree" type generative models for such intrusions to select features that are used by a Support Vector Machine Classifier. Our approach combines the ability of an HMM generative model to handle variable-length strings, i.e. the traces, and the non-asymptotic nature of Support Vector Machines that permits them to work well with small training sets
Security is one of the main requirements of the current computer systems, and recently it gains much...
This paper demonstrates that it is possible to model attacks witha low number of states and classify...
Abstract Support Vector Machines (SVMs) are among the most popular classifi-cation techniques adopte...
Intrusion is broadly defined as a successful attack on a network. Intrusion Detection System (IDS) i...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Cyber-security threats are a growing concern in networked environments. The development of Intrusion...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Support vector machines (SVMs) are among the most popular classification techniques adopted in secur...
ISR develops, applies and teaches advanced methodologies of design and analysis to solve complex, hi...
Security is one of the main requirements of the current computer systems, and recently it gains much...
This paper demonstrates that it is possible to model attacks witha low number of states and classify...
Abstract Support Vector Machines (SVMs) are among the most popular classifi-cation techniques adopte...
Intrusion is broadly defined as a successful attack on a network. Intrusion Detection System (IDS) i...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
Cyber-security threats are a growing concern in networked environments. The development of Intrusion...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
The increasing number of security attacks have inspired researchers to employ various classifiers, s...
A trojan horse is a program that surreptitiously performs its operation under the guise of a legitim...
Support vector machines (SVMs) are among the most popular classification techniques adopted in secur...
ISR develops, applies and teaches advanced methodologies of design and analysis to solve complex, hi...
Security is one of the main requirements of the current computer systems, and recently it gains much...
This paper demonstrates that it is possible to model attacks witha low number of states and classify...
Abstract Support Vector Machines (SVMs) are among the most popular classifi-cation techniques adopte...