Sciweavers

138 search results - page 2 / 28
» Hybrid Feature Selection for Modeling Intrusion Detection Sy...
Sort
View
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
13 years 11 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala
HICSS
2008
IEEE
222views Biometrics» more  HICSS 2008»
14 years 26 days ago
A Comprehensive Fuzzy Logic Model for Feature Performance Assessment against Network Attacks
—The feature selection phase is one of the first, and yet very important, tasks to be completed during the development of any Intrusion Detection System. If this phase is neglec...
Iosif-Viorel Onut, Ali A. Ghorbani
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
13 years 10 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 15 days ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...