Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
Abstract. We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal...
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
Abstract--The purpose of this demo is to foster a multilevel service oriented architecture for sensor networks that fully supports network dynamicity, auto-configuration, service d...
Jeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Ma...