Sciweavers

194 search results - page 15 / 39
» AdaBoost-Based Algorithm for Network Intrusion Detection
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 7 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 7 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
ACSAC
2002
IEEE
14 years 14 days ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
WEBI
2009
Springer
14 years 2 months ago
Adaptive Distributed Intrusion Detection Using Parametric Model
Due to the increasing demands for network security, distributed intrusion detection has become a hot research topic in computer science. However, the design and maintenance of the...
Jun Gao, Weiming Hu, Xiaoqin Zhang, Xi Li
ISNN
2005
Springer
14 years 1 months ago
Feature Selection and Intrusion Detection Using Hybrid Flexible Neural Tree
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Yuehui Chen, Ajith Abraham, Ju Yang