Sciweavers

1244 search results - page 25 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
WEBI
2005
Springer
15 years 9 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu
RAID
2000
Springer
15 years 7 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
15 years 10 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
SUTC
2006
IEEE
15 years 9 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
AINA
2004
IEEE
15 years 7 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen