Vidal's library
Title: Intelligent Agents for Intrusion Detection
Author: Guy Helmer, Johnny S. K. Wong, Vasant Honavar, and Les Miller
Book Tittle: Proceedings of the IEEE Information Technology Conference
Pages: 121--124
Year: 1998
Abstract: The paper focuses on intrusion detection and countermeasures with respect to widely-used operating systems and networks. The design and architecture of an intrusion detection system built from distributed agents is proposed to implement an intelligent system on which data mining can be performed to provide global, temporal views of an entire networked system. A starting point for agent intelligence in the system is the research into the use of machine learning over system call traces from the privileged sendmail program on UNIX. The authors use a rule learning algorithm to classify the system call traces for intrusion detection purposes and show the results

Cited by 83  -  Google Scholar

@InProceedings{helmer98a,
  author =	 {Guy Helmer and Johnny S. K. Wong and Vasant Honavar
                  and Les Miller},
  title =	 {Intelligent Agents for Intrusion Detection},
  googleid =	 {WkAV3QXSQHcJ:scholar.google.com/},
  booktitle =	 {Proceedings of the {IEEE} Information Technology
                  Conference},
  pages =	 {121--124},
  year =	 1998,
  abstract =	 {The paper focuses on intrusion detection and
                  countermeasures with respect to widely-used
                  operating systems and networks. The design and
                  architecture of an intrusion detection system built
                  from distributed agents is proposed to implement an
                  intelligent system on which data mining can be
                  performed to provide global, temporal views of an
                  entire networked system. A starting point for agent
                  intelligence in the system is the research into the
                  use of machine learning over system call traces from
                  the privileged sendmail program on UNIX. The authors
                  use a rule learning algorithm to classify the system
                  call traces for intrusion detection purposes and
                  show the results },
  keywords =     {ai application},
  url =		 {http://jmvidal.cse.sc.edu/library/helmer98a.pdf},
  citeseer =	 {helmer00lightweight.html},
  cluster = 	 {8593099011648733274}
}
Last modified: Wed Mar 9 10:14:31 EST 2011