Sciweavers

1274 search results - page 1 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
SECRYPT
2007
110views Business» more  SECRYPT 2007»
13 years 6 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
CSREASAM
2006
13 years 6 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 5 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
13 years 11 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 9 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok