2005
DOI: 10.1007/11538059_103
|View full text |Cite
|
Sign up to set email alerts
|

A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 44 publications
(21 citation statements)
references
References 7 publications
0
21
0
Order By: Relevance
“…In one of our previous works [11], a linear TD learning algorithm was applied to host-based intrusion detection using sequences of system calls and very promising results have been obtained. Nevertheless, the approximation ability of linear function approximators is limited and the performance of linear TD learning is greatly influenced by the selection of linear basis functions.…”
Section: Kernel-based Ls-td Learning For Intrusion Detectionmentioning
confidence: 79%
See 3 more Smart Citations
“…In one of our previous works [11], a linear TD learning algorithm was applied to host-based intrusion detection using sequences of system calls and very promising results have been obtained. Nevertheless, the approximation ability of linear function approximators is limited and the performance of linear TD learning is greatly influenced by the selection of linear basis functions.…”
Section: Kernel-based Ls-td Learning For Intrusion Detectionmentioning
confidence: 79%
“…As discussed in previous works [7] [11][12], each trace is defined as the sequence of system calls issued by a single process from the beginning of its execution to the end. If m successive system calls (o t-m+1 , o t-m+2 ,…,o t ) are selected as a state at time step t, and a sliding window with length l is defined, the traces of system calls can be transformed to corresponding state transition sequences.…”
Section: A Markov Reward Model For Host-based Idssmentioning
confidence: 99%
See 2 more Smart Citations
“…Reinforcement learning techniques have also been used to develop adaptive intrusion detection methods [21] for computer (wired) networks. Complex intrusion behavior is represented as a series of patterns and the learning agent is trained on audit data to identify these patterns.…”
Section: Reinforcement Learningmentioning
confidence: 99%