Sciweavers

912 search results - page 95 / 183
» Anomaly
Sort
View
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
14 years 24 days ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
AWIC
2004
Springer
14 years 20 days ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
DMIN
2006
157views Data Mining» more  DMIN 2006»
13 years 10 months ago
Data Mining of Air Traffic Control Operational Errors
In this paper we present the results of applying data mining techniques to identify patterns and anomalies in air traffic control operational errors (OEs). Reducing the OE rate is ...
Zohreh Nazeri
IJNSEC
2007
122views more  IJNSEC 2007»
13 years 8 months ago
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sendin...
Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abb...
IJSNET
2007
97views more  IJSNET 2007»
13 years 8 months ago
Stochastic binary sensor networks for noisy environments
— This paper proposes a stochastic framework for detecting anomalies or gathering interesting events in a noisy environment using a sensor network consisting of binary sensors. A...
T. Nguyen, Dong Nguyen, Huaping Liu, Duc A. Tran