Sciweavers

47 search results - page 3 / 10
» Detection of Unknown Computer Worms Activity Based on Comput...
Sort
View
ACSAC
2006
IEEE
14 years 6 days ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 6 months ago
Eigenspace-based anomaly detection in computer systems
We report on an automated runtime anomaly detection method at the application layer of multi-node computer systems. Although several network management systems are available in th...
Hisashi Kashima, Tsuyoshi Idé
IEEEARES
2006
IEEE
14 years 5 days ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
RAID
2007
Springer
14 years 8 days ago
Emulation-Based Detection of Non-self-contained Polymorphic Shellcode
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
ACCV
2010
Springer
13 years 2 months ago
Stream-based Active Unusual Event Detection
We present a new active learning approach to incorporate human feedback for on-line unusual event detection. In contrast to most existing unsupervised methods that perform passiv...
Chen Change Loy, Tao Xiang, Shaogang Gong