Sciweavers

765 search results - page 80 / 153
» Detecting Anomalies and Intruders
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 10 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 3 months ago
Network Intrusion Detection Using Genetic Clustering
Abstract. We apply the Unsupervised Niche Clustering (UNC), a genetic niching technique for robust and unsupervised clustering, to the intrusion detection problem. Using the normal...
Elizabeth Leon, Olfa Nasraoui, Jonatan Góme...
SIGCOMM
2009
ACM
15 years 4 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
JSAC
2006
95views more  JSAC 2006»
14 years 9 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
DEBS
2008
ACM
14 years 11 months ago
Service oriented architecture for heterogeneous and dynamic sensor networks
Abstract--The purpose of this demo is to foster a multilevel service oriented architecture for sensor networks that fully supports network dynamicity, auto-configuration, service d...
Jeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Ma...