Multi-stage intrusion detection system using hidden Markov model algorithm
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Do-Hyeon | - |
dc.contributor.author | Kim, Doo-Young | - |
dc.contributor.author | Jung, Jaeil | - |
dc.date.accessioned | 2022-12-21T04:45:17Z | - |
dc.date.available | 2022-12-21T04:45:17Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2008-01 | - |
dc.identifier.issn | 0000-0000 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/179066 | - |
dc.description.abstract | Intrusion detection systems are the basis of system protection from network attacks. However, intrusions are increasingly taking multi-stage procedures to attack a system, and cannot be detected by existing single stage intrusion detection systems. This paper proposes a multi-stage intrusion detection system architecture using Hidden Markov Model Algorithm. This system considers every stage used by recent intrusions and applies them to the Hidden Markov Model algorithm to determine which intrusion is used in the audit data. This architecture reduces overheads of intrusion agents and raises efficiency of the whole system. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | IEEE Computer Society | - |
dc.title | Multi-stage intrusion detection system using hidden Markov model algorithm | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jung, Jaeil | - |
dc.identifier.doi | 10.1109/ICISS.2008.22 | - |
dc.identifier.scopusid | 2-s2.0-48349108565 | - |
dc.identifier.bibliographicCitation | Proceedings of the International Conference on Information Science and Security, ICISS 2008, pp.72 - 77 | - |
dc.relation.isPartOf | Proceedings of the International Conference on Information Science and Security, ICISS 2008 | - |
dc.citation.title | Proceedings of the International Conference on Information Science and Security, ICISS 2008 | - |
dc.citation.startPage | 72 | - |
dc.citation.endPage | 77 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Computer architecture | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordPlus | Hidden Markov models | - |
dc.subject.keywordPlus | Network architecture | - |
dc.subject.keywordPlus | Audit data | - |
dc.subject.keywordPlus | Hidden markov modeling algorithms | - |
dc.subject.keywordPlus | Intrusion detection system architectures | - |
dc.subject.keywordPlus | Intrusion Detection Systems | - |
dc.subject.keywordPlus | Multi stage | - |
dc.subject.keywordPlus | Network attack | - |
dc.subject.keywordPlus | Single stage | - |
dc.subject.keywordPlus | System protection | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.identifier.url | https://ieeexplore.ieee.org/document/4438213 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.