Sciweavers

677 search results - page 90 / 136
» Dempster-Shafer for Anomaly Detection
Sort
View
OSDI
2004
ACM
14 years 8 months ago
PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services
Detecting network path anomalies generally requires examining large volumes of traffic data to find misbehavior. We observe that wide-area services, such as peerto-peer systems an...
Ming Zhang, Chi Zhang, Vivek S. Pai, Larry L. Pete...
NDSS
2005
IEEE
14 years 1 months ago
DNS-based Detection of Scanning Worms in an Enterprise Network
Worms are arguably the most serious security threat facing the Internet. Seeking a detection technique that is both sufficiently efficient and accurate to enable automatic conta...
David Whyte, Evangelos Kranakis, Paul C. van Oorsc...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 1 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ICSE
2009
IEEE-ACM
14 years 8 months ago
Discovering and representing systematic code changes
Software engineers often inspect program differences when reviewing others' code changes, when writing check-in comments, or when determining why a program behaves differentl...
Miryung Kim, David Notkin