Sciweavers

230 search results - page 7 / 46
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 1 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
ACSAC
2007
IEEE
14 years 1 months ago
Improving Signature Testing through Dynamic Data Flow Analysis
The effectiveness and precision of network-based intrusion detection signatures can be evaluated either by direct analysis of the signatures (if they are available) or by using bl...
Christopher Kruegel, Davide Balzarotti, William K....
PKDD
2009
Springer
174views Data Mining» more  PKDD 2009»
14 years 2 months ago
Active and Semi-supervised Data Domain Description
Data domain description techniques aim at deriving concise descriptions of objects belonging to a category of interest. For instance, the support vector domain description (SVDD) l...
Nico Görnitz, Marius Kloft, Ulf Brefeld
JCS
2002
115views more  JCS 2002»
13 years 7 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
CSREASAM
2003
13 years 9 months ago
KDD Feature Set Complaint Heuristic Rules for R2L Attack Detection
Automated rule induction procedures like machine learning and statistical techniques result in rules that lack generalization and maintainability. Developing rules manually throug...
Maheshkumar Sabhnani, Gürsel Serpen