Sciweavers

912 search results - page 86 / 183
» Anomaly
Sort
View
153
Voted
RAID
2009
Springer
15 years 9 months ago
Autonomic Intrusion Detection System
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns a...
Wei Wang 0012, Thomas Guyet, Svein J. Knapskog
109
Voted
SIGCOMM
2009
ACM
15 years 9 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
138
Voted
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 8 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
113
Voted
IMC
2005
ACM
15 years 8 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
112
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 8 months ago
Network Intrusion Detection Using Genetic Clustering
Abstract. We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal...
Elizabeth Leon, Olfa Nasraoui, Jonatan Góme...