Sciweavers

988 search results - page 26 / 198
» Intrusion Detection with Neural Networks
Sort
View
ACSC
2005
IEEE
14 years 2 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
IPPS
2007
IEEE
14 years 2 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
FLAIRS
2007
13 years 10 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
CCS
2007
ACM
14 years 2 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Network Intrusion Detection Using Genetic Clustering
Abstract. We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal...
Elizabeth Leon, Olfa Nasraoui, Jonatan Góme...