Penetration state transition analysis: A rule-based intrusion detection approach.
Phillip A. PorrasRichard A. KemmererPublished in: ACSAC (1992)
Keyphrases
- intrusion detection
- state transition
- anomaly detection
- intrusion detection system
- network security
- network intrusion detection
- detecting anomalous
- network traffic
- data mining
- data analysis
- high detection rate
- network intrusions
- input output
- object oriented
- hidden markov models
- computer security
- state transitions
- database
- intrusion prevention
- distributed intrusion detection