Sciweavers

2269 search results - page 27 / 454
» Behavioral Intrusion Detection
Sort
View
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
15 years 7 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 1 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 4 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
110
Voted
ICAI
2008
15 years 1 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang
75
Voted
IWIA
2003
IEEE
15 years 5 months ago
Intrusion Detection Force: An Infrastructure for Internet-Scale Intrusion Detection
Lawrence Teo, Yuliang Zheng, Gail-Joon Ahn