Sciweavers

40 search results - page 2 / 8
» On Pseudonymization of Audit Data for Intrusion Detection
Sort
View
FEGC
2009
94views Biometrics» more  FEGC 2009»
13 years 2 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 5 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
SIGMOD
2001
ACM
166views Database» more  SIGMOD 2001»
14 years 5 months ago
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characteriz...
Daniel Barbará, Julia Couto, Sushil Jajodia, Ning...
RAID
1999
Springer
13 years 9 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee