Sciweavers

839 search results - page 24 / 168
» Data Mining for Intrusion Detection: Techniques, Application...
Sort
View
118
Voted
JSAC
2006
163views more  JSAC 2006»
15 years 13 days ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
99
Voted
SAINT
2003
IEEE
15 years 5 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
ASPLOS
2010
ACM
15 years 7 months ago
Accelerating the local outlier factor algorithm on a GPU for intrusion detection systems
The Local Outlier Factor (LOF) is a very powerful anomaly detection method available in machine learning and classification. The algorithm defines the notion of local outlier in...
Malak Alshawabkeh, Byunghyun Jang, David R. Kaeli
AINA
2004
IEEE
15 years 4 months ago
Online Training of SVMs for Real-time Intrusion Detection
Abstract-- As intrusion detection essentially can be formulated as a binary classification problem, it thus can be solved by an effective classification technique-Support Vector Ma...
Zonghua Zhang, Hong Shen
WWW
2004
ACM
16 years 1 months ago
A web personalization system based on web usage mining techniques
In the past few years, web usage mining techniques have grown rapidly together with the explosive growth of the web, both in the research and commercial areas. In this work we pre...
Massimiliano Albanese, Antonio Picariello, Carlo S...