Sciweavers

2874 search results - page 47 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICIAP
2005
ACM
14 years 10 months ago
Learning Intrusion Detection: Supervised or Unsupervised?
Abstract. Application and development of specialized machine learning techniques is gaining increasing attention in the intrusion detection community. A variety of learning techniq...
Pavel Laskov, Patrick Düssel, Christin Sch&au...
ICMLA
2003
13 years 11 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
ACSC
2003
IEEE
14 years 3 months ago
Policies for Sharing Distributed Probabilistic Beliefs
In this paper, we present several general policies for deciding when to share probabilistic beliefs between agents for distributed monitoring. In order to evaluate these policies,...
Christopher Leckie, Kotagiri Ramamohanarao
ACSAC
1998
IEEE
14 years 2 months ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
CSREASAM
2007
13 years 11 months ago
Intrusion Detection System to Detect Wormhole Using Fault Localization Techniques
— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
Maitreya Natu, Adarshpal S. Sethi