Sciweavers

30 search results - page 1 / 6
» The Power of Temporal Pattern Processing in Anomaly Intrusio...
Sort
View
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ICIAP
2005
ACM
14 years 7 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
RAID
1999
Springer
13 years 11 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
ICARIS
2007
Springer
14 years 1 months ago
Towards a Novel Immune Inspired Approach to Temporal Anomaly Detection
Abstract. In this conceptual paper, we report on studies and initial definitions of an immune-inspired approach to temporal anomaly detection problems, where there is a strict temp...
Thiago S. Guzella, Tomaz A. Mota-Santos, Walmir M....
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang