Sciweavers

412 search results - page 7 / 83
» Intrusion Detection for an On-Going Attack
Sort
View
CANS
2005
Springer
134views Cryptology» more  CANS 2005»
14 years 28 days ago
A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time
Abstract. In this paper, we propose a new unsupervised anomaly detection framework for detecting network intrusions online. The framework consists of new anomalousness metrics name...
Wei Lu, Issa Traoré
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 1 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
14 years 2 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
ICDCS
2003
IEEE
14 years 21 days ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...