Sciweavers

44 search results - page 7 / 9
» Selecting Appropriate Counter-Measures in an Intrusion Detec...
Sort
View
RAID
2001
Springer
13 years 10 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
14 years 18 hour ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
SIGMETRICS
2005
ACM
102views Hardware» more  SIGMETRICS 2005»
13 years 11 months ago
A statistical framework for efficient monitoring of end-to-end network properties
Network service providers and customers are often concerned with aggregate performance measures that span multiple network paths. Unfortunately, forming such network-wide measures ...
David B. Chua, Eric D. Kolaczyk, Mark Crovella
KDD
2004
ACM
196views Data Mining» more  KDD 2004»
14 years 6 months ago
Adversarial classification
Essentially all data mining algorithms assume that the datagenerating process is independent of the data miner's activities. However, in many domains, including spam detectio...
Nilesh N. Dalvi, Pedro Domingos, Mausam, Sumit K. ...
HPDC
2007
IEEE
13 years 9 months ago
Transparent network services via a virtual traffic layer for virtual machines
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
John R. Lange, Peter A. Dinda