@inproceedings{ccf3a992bbf74f1fa91a88106f3ad33e,
title = "Modeling program behaviors by hidden markov models for intrusion detection",
abstract = "Intrusion detection is an important technique in the defense-in-depth network security framework and a hot topic in computer network security in recent years. In this paper, a new efficient intrusion detection method based on Hidden Markov Models (HMMs) is presented. HMMs are applied to model the normal program behaviors using traces of system calls issued by processes. The output probability of a sequence of system calls is calculated by the normal model built If the probability of a sequence in a trace is below a certain threshold, the sequence is flagged as a mismatch. If the ratio between the mismatches and all the sequences in a trace exceeds another threshold, the trace is then considered as a possible intrusion. The method is implemented and tested on the sendmail system call data from the University of New Mexico. Experimental results show that the performance of the proposed method in intrusion detection is better than Other methods.",
keywords = "Anomaly detection, Computer security, Hidden markov models (HMMs), Intrusion detection, Pattern recognition, Program behaviors, System call",
author = "Wei Wang and Guan, {Xiao Hong} and Zhang, {Xiang Liang}",
year = "2004",
language = "English (US)",
isbn = "0780384032",
series = "Proceedings of 2004 International Conference on Machine Learning and Cybernetics",
pages = "2830--2835",
booktitle = "Proceedings of 2004 International Conference on Machine Learning and Cybernetics",
note = "Proceedings of 2004 International Conference on Machine Learning and Cybernetics ; Conference date: 26-08-2004 Through 29-08-2004",
}