Sciweavers

91 search results - page 1 / 19
» Feature Construction Scheme for Efficient Intrusion Detectio...
Sort
View
JISE
2010
107views more  JISE 2010»
12 years 11 months ago
Feature Construction Scheme for Efficient Intrusion Detection System
Eunhye Kim, Seungmin Lee, Ki Hoon Kwon, Sehun Kim
ACSAC
2004
IEEE
13 years 8 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ICONIP
2004
13 years 6 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
IRI
2005
IEEE
13 years 10 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 5 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan