Intrusion detection by combining multiple hidden markov models

Jongho Choy, Sung Bae Cho

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Intrusion detection techniques can be divided into two groups according to the type of information they use: misuse detection and anomaly detection. Anomaly detection models normal behaviors and attempts to detect intrusions by noting significant deviations from normal behavior. By constructing models using multiple measures and combining them, we can expect an enhanced reliability in intrusion detection. In this paper, we propose a technique that combine multiple models using voting technique to improve the detection rate of intrusion detection system.

Original languageEnglish
Title of host publicationPRICAI 2000, Topics in Artificial Intelligence - 6th Pacific Rim International Conference on Artificial Intelligence, Proceedings
EditorsRiichiro Mizoguchi, John Slaney
PublisherSpringer Verlag
ISBN (Print)3540679251, 9783540679257, 9783540679257
Publication statusPublished - 2000
Event6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000 - Melbourne, VIC, Australia
Duration: 2000 Aug 282000 Sept 1

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1886
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th Pacific Rim International Conference on Artificial Intelligence, PRICAI 2000
Country/TerritoryAustralia
CityMelbourne, VIC
Period00/8/2800/9/1

Bibliographical note

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 2000.

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Intrusion detection by combining multiple hidden markov models'. Together they form a unique fingerprint.

Cite this