Sciweavers

566 search results - page 8 / 114
» Detecting and Identifying Network Anomalies by Component Ana...
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 8 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
IMC
2005
ACM
14 years 2 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
IPPS
2007
IEEE
14 years 2 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
ICDCS
2003
IEEE
14 years 1 months ago
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
With the proliferation of wireless devices, mobile ad hoc networking (MANET) has become a very exciting and important technology due to its characteristics of open medium and dyna...
Yi-an Huang, Wei Fan, Wenke Lee, Philip S. Yu