Sciweavers

839 search results - page 12 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
100
Voted
IJNSEC
2008
115views more  IJNSEC 2008»
15 years 12 days ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
ESORICS
2006
Springer
15 years 4 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
124
Voted
CSREASAM
2006
15 years 1 months ago
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
99
Voted
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
15 years 6 months ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
139
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 4 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...