Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Multi-stage intrusion detection system using hidden Markov model algorithm

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Do-Hyeon-
dc.contributor.authorKim, Doo-Young-
dc.contributor.authorJung, Jaeil-
dc.date.accessioned2022-12-21T04:45:17Z-
dc.date.available2022-12-21T04:45:17Z-
dc.date.created2022-09-16-
dc.date.issued2008-01-
dc.identifier.issn0000-0000-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/179066-
dc.description.abstractIntrusion detection systems are the basis of system protection from network attacks. However, intrusions are increasingly taking multi-stage procedures to attack a system, and cannot be detected by existing single stage intrusion detection systems. This paper proposes a multi-stage intrusion detection system architecture using Hidden Markov Model Algorithm. This system considers every stage used by recent intrusions and applies them to the Hidden Markov Model algorithm to determine which intrusion is used in the audit data. This architecture reduces overheads of intrusion agents and raises efficiency of the whole system.-
dc.language영어-
dc.language.isoen-
dc.publisherIEEE Computer Society-
dc.titleMulti-stage intrusion detection system using hidden Markov model algorithm-
dc.typeArticle-
dc.contributor.affiliatedAuthorJung, Jaeil-
dc.identifier.doi10.1109/ICISS.2008.22-
dc.identifier.scopusid2-s2.0-48349108565-
dc.identifier.bibliographicCitationProceedings of the International Conference on Information Science and Security, ICISS 2008, pp.72 - 77-
dc.relation.isPartOfProceedings of the International Conference on Information Science and Security, ICISS 2008-
dc.citation.titleProceedings of the International Conference on Information Science and Security, ICISS 2008-
dc.citation.startPage72-
dc.citation.endPage77-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusComputer architecture-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusHidden Markov models-
dc.subject.keywordPlusNetwork architecture-
dc.subject.keywordPlusAudit data-
dc.subject.keywordPlusHidden markov modeling algorithms-
dc.subject.keywordPlusIntrusion detection system architectures-
dc.subject.keywordPlusIntrusion Detection Systems-
dc.subject.keywordPlusMulti stage-
dc.subject.keywordPlusNetwork attack-
dc.subject.keywordPlusSingle stage-
dc.subject.keywordPlusSystem protection-
dc.subject.keywordPlusIntrusion detection-
dc.identifier.urlhttps://ieeexplore.ieee.org/document/4438213-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 융합전자공학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jung, Jaeil photo

Jung, Jaeil
COLLEGE OF ENGINEERING (SCHOOL OF ELECTRONIC ENGINEERING)
Read more

Altmetrics

Total Views & Downloads

BROWSE