Sciweavers

122 search results - page 4 / 25
» Exploiting efficient data mining techniques to enhance intru...
Sort
View
IJNSEC
2010
141views more  IJNSEC 2010»
13 years 1 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 6 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
14 years 5 days ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 8 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
ICIAP
2005
ACM
14 years 6 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero