{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:18:58Z","timestamp":1737436738839,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734987"},{"type":"electronic","value":"9783540734994"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73499-4_34","type":"book-chapter","created":{"date-parts":[[2007,8,27]],"date-time":"2007-08-27T04:01:39Z","timestamp":1188187299000},"page":"449-463","source":"Crossref","is-referenced-by-count":10,"title":["Sensing Attacks in Computers Networks with Hidden Markov Models"],"prefix":"10.1007","author":[{"given":"Davide","family":"Ariu","sequence":"first","affiliation":[]},{"given":"Giorgio","family":"Giacinto","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Perdisci","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Axelsson, S.: The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection. In: Proc. of RAID (May 1999)","DOI":"10.1145\/319709.319710"},{"issue":"1","key":"34_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1214\/aoms\/1177697196","volume":"41","author":"L.E. Baum","year":"1970","unstructured":"Baum, L.E., Petrie, T., Soules, G., Weiss, N.: A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann. Math. Statist.\u00a041(1), 164\u2013171 (1970)","journal-title":"Ann. Math. Statist."},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/3-540-45065-3_8","volume-title":"Machine Learning and Data Mining in Pattern Recognition","author":"M. Bicego","year":"2003","unstructured":"Bicego, M., Murino, V., Figueiredo, M.: Similarity-Based Clustering of Sequences Using Hidden Markov Models. In: Perner, P., Rosenfeld, A. (eds.) MLDM 2003. LNCS, vol.\u00a02734, pp. 86\u201395. Springer, Heidelberg (2003)"},{"key":"34_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-3-540-45248-5_12","volume-title":"Recent Advances in Intrusion Detection","author":"S. Cho","year":"2003","unstructured":"Cho, S., Han, S.: Two sophisticated techniques to improve HMM-based intrusion detection systems. In: Vigna, G., Kr\u00fcgel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol.\u00a02820, pp. 207\u2013219. Springer, Heidelberg (2003)"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proc. of the IEEE Computer Society, Symposium on Research in Security and Privacy (1992)","DOI":"10.1109\/RISP.1992.213257"},{"issue":"2","key":"34_CR6","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSE.1987.232894","volume":"SE-13","author":"D.E. Denning","year":"1987","unstructured":"Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Software Eng.\u00a0SE-13(2), 222\u2013232 (1987)","journal-title":"IEEE Trans. Software Eng."},{"key":"34_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/3-540-48219-9_38","volume-title":"Multiple Classifier Systems","author":"C. Dietrich","year":"2001","unstructured":"Dietrich, C., Schwenker, F., Palm, G.: Classification of Time Series Utilizing Temporal and Decision Fusion. In: Kittler, J., Roli, F. (eds.) MCS 2001. LNCS, vol.\u00a02096, pp. 378\u2013387. Springer, Heidelberg (2001)"},{"key":"34_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45014-9_1","volume-title":"Multiple Classifier Systems","author":"T. Dietterich","year":"2000","unstructured":"Dietterich, T.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol.\u00a01857, pp. 1\u201315. Springer, Heidelberg (2000)"},{"key":"34_CR9","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2000","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley-Interscience, Chichester (2000)"},{"key":"34_CR10","volume-title":"Proceedings of the 2003 IEEE Symposium on Security and Privacy","author":"H.H. Feng","year":"2003","unstructured":"Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly detection using call stack information. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Gao, F., Sun, J., Wei, Z.: The prediction role of Hidden Markov Model in Intrusion Detection. In: Proc. of IEEE CCECE 2003, vol. 2, pp. 893\u2013896 (May 2003)","DOI":"10.1109\/CCECE.2003.1226038"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11856214_2","volume-title":"Recent Advances in Intrusion Detection","author":"D. Gao","year":"2006","unstructured":"Gao, D., Reiter, M., Song, D.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol.\u00a04219, pp. 19\u201340. Springer, Heidelberg (2006)"},{"issue":"12","key":"34_CR13","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1016\/S0167-8655(03)00004-7","volume":"24","author":"G. Giacinto","year":"2003","unstructured":"Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion in computer networks. Pattern Recognition Letters\u00a024(12), 1795\u20131803 (2003)","journal-title":"Pattern Recognition Letters"},{"key":"34_CR14","unstructured":"Hashem, M.: Network Based Hidden Markov Models Intrusion Detection Systems. IJICIS, 6(1) (2006)"},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Hoang, X.D., Hu, J.: An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls. In: Proc. of 12th IEEE Conference on Networks, 2004, vol.\u00a02, pp. 470\u2013474 (2004)","DOI":"10.1109\/ICON.2004.1409210"},{"issue":"2","key":"34_CR16","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"L. Kuncheva","year":"2001","unstructured":"Kuncheva, L., Bezdek, J.C., Duin, R.P.W.: Decision Templates for Multiple Classifier Fusion. Pattern Recognition\u00a034(2), 299\u2013314 (2001)","journal-title":"Pattern Recognition"},{"key":"34_CR17","doi-asserted-by":"crossref","DOI":"10.1002\/0471660264","volume-title":"Combining Pattern Classifiers: Methods and Algorithms","author":"L. Kuncheva","year":"2004","unstructured":"Kuncheva, L.: Combining Pattern Classifiers: Methods and Algorithms. Wiley, Chichester (2004)"},{"key":"34_CR18","doi-asserted-by":"crossref","unstructured":"Mc Hugh, J., Christie, A., Allen, J.: Defending yourself: The role of Intrusion Detection Systems. IEEE Software 42\u201351 (September\/October 2000)","DOI":"10.1109\/52.877859"},{"key":"34_CR19","unstructured":"Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic Blending Attack. In: USENIX Security Symposium (2006)"},{"key":"34_CR20","volume-title":"Pratical Intrusion Detection Handbook","author":"P.E. Proctor","year":"2001","unstructured":"Proctor, P.E.: Pratical Intrusion Detection Handbook. Prentice-Hall, Englewood Cliffs (2001)"},{"key":"34_CR21","doi-asserted-by":"crossref","unstructured":"Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronic Letters\u00a038(13) (June 2002)","DOI":"10.1049\/el:20020467"},{"issue":"2","key":"34_CR22","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. Proc. of IEEE\u00a077(2), 257\u2013286 (1989)","journal-title":"Proc. of IEEE"},{"key":"34_CR23","unstructured":"Roesch, M.: Snort - Lightweight Intrusion Detection for Networks. In: Proc. of the 13th USENIX conference on System Administration, LISA \u201999"},{"key":"34_CR24","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"C. Warrender","year":"1999","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proc. of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1999)"},{"key":"34_CR25","unstructured":"Zhang, X., Fan, P., Zhu, Z.: A New Anomaly Detection Method Based on Hierarchical HMM. In: Proceedings of the 4th PDCAT conference (2003)"},{"key":"34_CR26","unstructured":"IDS-Informer, www.blade-software.com"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Data Mining in Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73499-4_34.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T17:20:50Z","timestamp":1737393650000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73499-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734987","9783540734994"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73499-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}