Sciweavers

799 search results - page 87 / 160
» Network anomaly detection based on TCM-KNN algorithm
Sort
View
IPPS
2007
IEEE
14 years 2 months ago
Recurrent neural networks towards detection of SQL attacks
In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
Jaroslaw Skaruz, Franciszek Seredynski
CNSM
2010
13 years 5 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
Fixed-Period Packet Sampling and its Application to Flow Rate Estimation
Abstract— We propose a packet sampling strategy called fixedperiod sampling, which selects at most one packet in every fixedlength period. Under the fixed-period sampling, the...
Sadayoshi Ito, Kousuke Uchiyama, Shigeo Shioda
TELSYS
2008
114views more  TELSYS 2008»
13 years 7 months ago
Efficient probe selection algorithms for fault diagnosis
Increase in the network usage for more and more performance critical applications has caused a demand for tools that can monitor network health with minimum management traffic. Ada...
Maitreya Natu, Adarshpal S. Sethi, Errol L. Lloyd
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
14 years 9 months ago
ViEWNet: Visual Exploration of Region-Wide Traffic Networks
Location-based services and data mining algorithms analyzing objects moving on a complex traffic network are becoming increasingly important. In this paper, we introduce a new app...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...