Sciweavers

1274 search results - page 4 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 8 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 8 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
14 years 10 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 3 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
RAID
1999
Springer
14 years 25 days ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen