Sciweavers

345 search results - page 8 / 69
» Using Active Learning in Intrusion Detection
Sort
View
ACSAC
1999
IEEE
14 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 3 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
DEON
2008
Springer
13 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
AUSAI
2003
Springer
14 years 3 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho