2005
DOI: 10.1007/978-3-540-31815-6_9
|View full text |Cite
|
Sign up to set email alerts
|

Service Discrimination and Audit File Reduction for Effective Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2005
2005
2005
2005

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…The reason for time reduction is that the order of the HMMs training algorithm is O(n 2 l), where n is the number of states in the HMM, and l is length of the training sequence. In figure 2 we show training times for the HMMs presented in [4]. In each figure, training times for unfolded sessions and its folded counterpart are [4].…”
Section: Validation Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The reason for time reduction is that the order of the HMMs training algorithm is O(n 2 l), where n is the number of states in the HMM, and l is length of the training sequence. In figure 2 we show training times for the HMMs presented in [4]. In each figure, training times for unfolded sessions and its folded counterpart are [4].…”
Section: Validation Resultsmentioning
confidence: 99%
“…All these n-grams have an associated occurrence count, and the total number of system calls present in the original log file. The n-gram set used in the folding process and the dictionary are available at our web site 4 . Along with the size of the n-grams, the number of system calls will define the reduction ratio.…”
Section: Fig 1 Mixed Services and Telnet Histogramsmentioning
confidence: 99%
See 3 more Smart Citations