Sciweavers

1013 search results - page 25 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
120
Voted
ACSAC
2001
IEEE
15 years 7 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
125
Voted
AINA
2009
IEEE
15 years 8 months ago
Correlating TCP/IP Interactive Sessions with Correlation Coefficient to Detect Stepping-Stone Intrusion
-- Most network intruders launch their attacks through stepping-stones to reduce the risks of being discovered. To uncover such intrusions, one prevalent, challenging, and critical...
Guoqing Zhao, Jianhua Yang, Gurdeep S. Hura, Long ...
116
Voted
PAKDD
2009
ACM
115views Data Mining» more  PAKDD 2009»
15 years 10 months ago
Data Mining for Intrusion Detection: From Outliers to True Intrusions
Data mining for intrusion detection can be divided into several sub-topics, among which unsupervised clustering has controversial properties. Unsupervised clustering for intrusion...
Goverdhan Singh, Florent Masseglia, Céline ...
65
Voted
ICIP
2002
IEEE
16 years 5 months ago
Robust real-time intrusion detection with fuzzy classification
Giovanni Milanesi, Augusto Sarti, Stefano Tubaro
113
Voted
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 9 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park