Sciweavers

2269 search results - page 22 / 454
» Behavioral Intrusion Detection
Sort
View
127
Voted
CSREASAM
2006
15 years 1 months ago
TRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
15 years 6 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
83
Voted
ETRICS
2006
15 years 4 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
142
Voted
JNCA
2007
179views more  JNCA 2007»
15 years 10 days ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...
175
Voted
VLDB
2005
ACM
153views Database» more  VLDB 2005»
16 years 20 days ago
An effective and efficient algorithm for high-dimensional outlier detection
Abstract. The outlier detection problem has important applications in the field of fraud detection, network robustness analysis, and intrusion detection. Most such applications are...
Charu C. Aggarwal, Philip S. Yu