{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T02:10:08Z","timestamp":1738289408630,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":26,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_18","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"269-284","source":"Crossref","is-referenced-by-count":2,"title":["User Session Modeling for Effective Application Intrusion Detection"],"prefix":"10.1007","author":[{"given":"Kapil Kumar","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Baikunth","family":"Nath","sequence":"additional","affiliation":[]},{"given":"Kotagiri","family":"Ramamohanarao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"ANSI\/X3\/SPARC Study Group on Data Base Management Systems: Interim Report, FDT (bulletin of ACM SIGMOD) 7, No.2, 1975."},{"key":"18_CR2","unstructured":"osCommerce, Open Source Online Shop E-Commerce Solutions. Last accessed: January 08, 2008. http:\/\/www.oscommerce.com\/."},{"key":"18_CR3","first-page":"22","volume":"2212","author":"M. Almgren","year":"2001","unstructured":"M. Almgren and U. Lindqvist. Application-Integrated Data Collection for Security Monitoring. In 4th International Symposium on Recent Advances in Intrusion Detection, pages 22\u201336. LNCS, Springer-Verlag, Vol (2212), 2001.","journal-title":"LNCS, Springer-Verlag"},{"key":"18_CR4","unstructured":"S. Axelsson. Research in Intrusion-Detection Systems: A Survey. Technical Report 98-17, Department of Computer Engineering, Chalmers University of Technology, 1998."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"R. Bace and P. Mell. Intrusion Detection Systems. Gaithersburg, MD : Computer Security Division, Information Technology Laboratory, NIST, 2001.","DOI":"10.6028\/NIST.SP.800-31"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"E. Bertino, A. Kamra, E. Terzi, and A. Vakali. Intrusion Detection in RBAC-Administered Databases. In 21st Annual Computer Security Applications Conference. IEEE, 2005.","DOI":"10.1109\/CSAC.2005.33"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"C. Y. Chung, M. Gertz, and K. Levitt. DEMIDS: A Misuse Detection System for Database Systems. In 3rd International IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems, pages 159\u2013178. Kluwer Academic Pub., 1999.","DOI":"10.1007\/978-0-387-35501-6_12"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"L. Desmet, F. Piessens, W. Joosen, and P. Verbaeten. Bridging the Gap Between Web Application Firewalls andWeb Applications. In 4th ACM workshop on Formal methods in security, FMSE, pages 67\u201377. ACM, 2006.","DOI":"10.1145\/1180337.1180344"},{"key":"18_CR9","unstructured":"H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Sommer. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection. In 15th Usenix Security Symposium, pages 257\u2013272, 2006."},{"key":"18_CR10","unstructured":"K. K. Gupta, B. Nath, and K. Ramamohanarao. Application Intrusion Detection Dataset. http:\/\/www.csse.unimelb.edu.au\/\\ kgupta."},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"K. K. Gupta, B. Nath, and K. Ramamohanarao. Layered Approach using Conditional Random Fields for Intrusion Detection. IEEE Transactions on Dependable and Secure Computing. In Press.","DOI":"10.1109\/TDSC.2008.20"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"K. K. Gupta, B. Nath, and K. Ramamohanarao. Conditional Random Fields for Intrusion Detection. In 21st International Conference on Advanced Information Networking and Applications Workshops, pages 203\u2013208. IEEE, 2007.","DOI":"10.1109\/AINAW.2007.126"},{"key":"18_CR13","first-page":"285","volume":"3975","author":"K.K. Gupta","year":"2006","unstructured":"K. K. Gupta, B. Nath, K. Ramamohanarao, and A. Kazi. Attacking Confidentiality: An Agent Based Approach. In IEEE International Conference on Intelligence and Security Informatics, pages 285\u2013296. LNCS, Springer Verlag, Vol (3975), 2006.","journal-title":"LNCS, Springer Verlag"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Y. Hu and B. Panda. Identification of Malicious Transactions in Database Systems. In 7th International Database Engineering and Applications Symposium, pages 329\u2013335. IEEE, 2003.","DOI":"10.1109\/IDEAS.2003.1214946"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Y. Hu and B. Panda. A Data Mining Approach for Database Intrusion Detection. In ACM symposium on Applied Computing, pages 711\u2013716. ACM, 2004.","DOI":"10.1145\/967900.968048"},{"key":"18_CR16","first-page":"9","volume-title":"Conditional Structure versus Conditional Estimation in NLP Models. In ACL-02 Conference on Empirical methods in Natural Language Processing","author":"D. Klein","year":"2002","unstructured":"D. Klein and C. D. Manning. Conditional Structure versus Conditional Estimation in NLP Models. In ACL-02 Conference on Empirical methods in Natural Language Processing Vol (10), pages 9\u201316. Association for Computational Linguistics, Morristown, NJ, USA, 2002."},{"key":"18_CR17","unstructured":"T. Kudu. CRF++: Yet another CRF toolkit. Last accessed: February 9, 2008. http:\/\/ crfpp.sourceforge.net\/."},{"key":"18_CR18","unstructured":"J. Lafferty, A. McCallum, and F. Pereira. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In 18th International Conference on Machine Learning, pages 282\u2013289, 2001."},{"key":"18_CR19","first-page":"264","volume":"2502","author":"S.Y. Lee","year":"2002","unstructured":"S. Y. Lee,W. L. Low, and P. Y.Wong. Learning Fingerprints for a Database Intrusion Detection System. In 7th European Symposium on Research in Computer Security, Vol (2502), pages 264\u2013279. LNCS, Springer-Verlag, 2002.","journal-title":"LNCS, Springer-Verlag"},{"key":"18_CR20","unstructured":"W. L. Low, J. Lee, and P. Teoh. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions. In 4th International Conference on Enterprise Information Systems, pages 264\u2013269, 2002."},{"issue":"12","key":"18_CR21","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"A. Patcha and J.-M. Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448\u20133470, 2007.","journal-title":"Computer Networks"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"C. Sutton and A. McCallum. An Introduction to Conditional Random Fields for Relational Learning. In Introduction to Statistical Relational Learning. MIT, 2006.","DOI":"10.7551\/mitpress\/7432.003.0006"},{"key":"18_CR23","unstructured":"I. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2005."},{"issue":"4","key":"18_CR24","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1109\/3468.935043","volume":"31","author":"N. Ye","year":"2001","unstructured":"N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu. Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 31(4):266\u2013274, 2001.","journal-title":"Systems and Humans"},{"key":"18_CR25","first-page":"1671","volume":"3","author":"Y. Zhong","year":"2004","unstructured":"Y. Zhong and Xiao-Lin-Qin. Research on Algorithm of User Query Frequent Itemsets Mining. In 3rd International Conference on Machine Learning and Cybernetics, Vol (3), pages 1671\u2013 1676. IEEE, 2004.","journal-title":"IEEE"},{"key":"18_CR26","first-page":"2096","volume":"4","author":"Y. Zhong","year":"2005","unstructured":"Y. Zhong, Z. Zhu, and X. Qin. A Clustering Method Based on Data Queries and Its Application in Database Intrusion Detection. In 4th International Conference on Machine Learning and Cybernetics, Vol (4), pages 2096\u20132101. IEEE, 2005.","journal-title":"IEEE"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T01:31:41Z","timestamp":1738287101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_18","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}