Sciweavers

329 search results - page 47 / 66
» Utilizing Neural Networks For Effective Intrusion Detection
Sort
View
ICPPW
2002
IEEE
14 years 14 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins
IJCNN
2006
IEEE
14 years 1 months ago
Data Fusion for Outlier Detection through Pseudo-ROC Curves and Rank Distributions
— This paper proposes a novel method of fusing models for classification of unbalanced data. The unbalanced data contains a majority of healthy (negative) instances, and a minor...
Paul F. Evangelista, Mark J. Embrechts, Boleslaw K...
AAMAS
2006
Springer
13 years 7 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
ANSS
2006
IEEE
14 years 1 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
DMIN
2006
106views Data Mining» more  DMIN 2006»
13 years 9 months ago
A Medical Claim Fraud/Abuse Detection System based on Data Mining: A Case Study in Chile
This paper describes an effective medical claim fraud/abuse detection system based on data mining used by a Chilean private health insurance company. Fraud and abuse in medical cla...
Pedro A. Ortega, Cristián J. Figueroa, Gonz...