Sciweavers

Share
234 search results - page 2 / 47
» A Labeled Data Set for Flow-Based Intrusion Detection
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
6 years 9 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable deļ¬nition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
RSP
2007
IEEE
158views Control Systems» more  RSP 2007»
9 years 1 months ago
SPP-NIDS - A Sea of Processors Platform for Network Intrusion Detection Systems
A widely used approach to avoid network intrusion is SNORT, an open source Network Intrusion Detection System (NIDS). This work describes SPP-NIDS, a architecture for intrusion de...
Luis Carlos Caruso, Guilherme Guindani, Hugo Schmi...
KDD
2008
ACM
140views Data Mining» more  KDD 2008»
9 years 7 months ago
Semi-supervised approach to rapid and reliable labeling of large data sets
Supervised classification methods have been shown to be very effective for a large number of applications. They require a training data set whose instances are labeled to indicate...
György J. Simon, Vipin Kumar, Zhi-Li Zhang
JSS
2002
198views more  JSS 2002»
8 years 6 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
ICNC
2005
Springer
9 years 19 days ago
Applying Genetic Programming to Evolve Learned Rules for Network Anomaly Detection
The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set is the most widely used public benchmark for testing intrusion detection systems. But the presence...
Chuanhuan Yin, Shengfeng Tian, Houkuan Huang, Jun ...
books