Sciweavers

912 search results - page 68 / 183
» Anomaly
Sort
View
113
Voted
ICNP
1998
IEEE
15 years 6 months ago
Statistical Anomaly Detection for Link-State Routing Protocols
The JiNao project at MCNC/NCSU focuses on detecting intrusions, especially insider attacks, against OSPF (Open Shortest Path First) routing protocol. This paper presents the imple...
D. Qu, Brain Vetter, Feiyi Wang, R. Narayan, Shyht...
184
Voted
RAID
1999
Springer
15 years 6 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
92
Voted
CCS
1998
ACM
15 years 6 months ago
Temporal Sequence Learning and Data Reduction for Anomaly Detection
Terran Lane, Carla E. Brodley
114
Voted
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
15 years 6 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
104
Voted
AUSAI
2006
Springer
15 years 6 months ago
Detecting Anomalies and Intruders
Brittleness is a well-known problem in expert systems where a conclusion can be made, which human common sense would recognise as impossible e.g. that a male is pregnant. We have e...
Akara Prayote, Paul Compton