参考文献
[1] 田新广, 段洣毅. 基于shell命令和多重行为模式挖掘的用户伪装攻击检测[J]. 计算机学报, 2010, 33(4): 697-705.
[2] Kim H S, Cha S D. Empirical Evaluation of SVM-based Mas- querade Detection Using UNIX Commands[J]. Computer and Security, 2005, 24(2): 160-168.
[3] Schonlau M, Mouchel W. Computer Intrusion: Detecting Mas- querades[J]. Statistical Science, 2001, 16(1): 58-74.
[4] Li Ling, Sui Song, Manikopoulos C N. Windows NT User Profiling for Masquerader Detection[C]//Proc. of International Conference on Networking Sense and Control. [S. l.]: IEEE Computer Society, 2006: 386-391.
[5] Garg A, Rahalkar R, Upadhyaya S, et al. Profiling Users in GUI Based Systems for Masquerade Detection[C]//Proc. of Information Assurance Workshop. New York, USA: IEEE Computer Society, 2006: 48-54.
[6] Strasburg C, Krishnan S, Dorman K, et al. Masquerade Detec- tion in Network Environments[C]//Proc. of the 10th IEEE/ IPSJ International Symposium on Applications and the Internet. Seoul, Korea: IEEE Computer Society, 2010: 38-44.
[7] Maxion R A, Townsend T N. Masquerade Detection Augment- ed with Error Analysis[J]. IEEE Transactions on Reliability, 2004, 53(1): 124-147.
[8] Lane T, Carla E B. An Empirical Study of Two Approaches to Sequence Learning for Anomaly Detection[J]. Machine Learning, 2003, 51(1): 73-107.
[9] 梁春林, 彭凌西. 基于免疫遗传的伪装入侵检测[J]. 计算机工程与设计, 2010, 31(23): 4968-4970, 4975.
[10] 肖 喜, 田新广, 翟起滨. 基于shell命令和Markov链模型的用户伪装攻击检测[J]. 通信学报, 2011, 32(3): 98-105.
[11] 曾剑平, 郭东辉. 基于区间值2型模糊集的伪装入侵检测算法[J]. 电子学报, 2008, 36(4): 777-780.
[12] Munafo M, Finamore A. TSTAT[EB/OL]. (2012-04-02). http://tstat.tlc.polito.it/index.shtml.
[13] Lin Chih-Jen. LIBSVM[EB/OL]. (2002-06-23). http://www. csie.ntu.edu.tw/~cjlin/.
[14] 张晓龙, 任 芳. 支持向量机与AdaBoost的结合算法研 究[J]. 计算机应用研究, 2009, 26(1): 77-78, 100.
[15] Sadre R, Aiko P. SimpleWeb/University of Twenty Traffic Traces Data Repository[EB/OL]. (2010-04-29). http://traces. simpleweb.org/. 编辑 陆燕菲 |