Sciweavers

322 search results - page 33 / 65
» A System for in-Network Anomaly Detection
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 1 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
CIS
2005
Springer
14 years 1 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
CCR
2008
86views more  CCR 2008»
13 years 7 months ago
The need for simulation in evaluating anomaly detectors
Anomalous events that affect the performance of networks are a fact of life. It is therefore not surprising that recent years have seen an explosion in research on network anomaly...
Haakon Ringberg, Matthew Roughan, Jennifer Rexford
SAC
2004
ACM
14 years 29 days ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi