Sciweavers

677 search results - page 73 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
CIS
2005
Springer
14 years 1 months ago
Computational Intelligence for Network Intrusion Detection: Recent Contributions
Computational intelligence has figured prominently in many solutions to the network intrusion detection problem since the 1990s. This prominence and popularity has continued in the...
Asim Karim
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Network Intrusion Detection Using Genetic Clustering
Abstract. We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal...
Elizabeth Leon, Olfa Nasraoui, Jonatan Góme...
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
JSAC
2006
95views more  JSAC 2006»
13 years 7 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...