Sciweavers

345 search results - page 3 / 69
» Combining Filtering and Statistical Methods for Anomaly Dete...
Sort
View
CIA
2008
Springer
13 years 7 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
FSKD
2007
Springer
102views Fuzzy Logic» more  FSKD 2007»
13 years 7 months ago
Statistical and Fuzzy Approach for Database Security
A new type of database anomaly is described by addressing the concept of Cumulated Anomaly in this paper. Dubiety-Determining Model (DDM), which is a detection model basing on sta...
Gang Lu, Junkai Yi, Kevin Lü
ICPPW
2008
IEEE
13 years 11 months ago
Disparity: Scalable Anomaly Detection for Clusters
In this paper, we describe disparity, a tool that does parallel, scalable anomaly detection for clusters. Disparity uses basic statistical methods and scalable reduction operation...
Narayan Desai, Rick Bradshaw, Ewing L. Lusk
CORR
2010
Springer
206views Education» more  CORR 2010»
13 years 5 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
WOSS
2004
ACM
13 years 10 months ago
Combining statistical monitoring and predictable recovery for self-management
Complex distributed Internet services form the basis not only of e-commerce but increasingly of mission-critical networkbased applications. What is new is that the workload and in...
Armando Fox, Emre Kiciman, David A. Patterson