Sciweavers

479 search results - page 1 / 96
» Intrusion Detection Based on Data Mining
Sort
View
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 6 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
CSREASAM
2006
13 years 7 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
14 years 17 days ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
ICEIS
2003
IEEE
13 years 11 months ago
Intrusion Detection Based on Data Mining
Xuan Dau Hoang, Jiankun Hu, Peter Bertók
IEEEIAS
2009
IEEE
14 years 13 days ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof