Sciweavers

334 search results - page 3 / 67
» Improving Intrusion Detection Performance using Keyword Sele...
Sort
View
GECCO
2005
Springer
183views Optimization» more  GECCO 2005»
13 years 12 months ago
802.11 network intrusion detection using genetic programming
Genetic Programming (GP) based Intrusion Detection Systems (IDS) use connection state network data during their training phase. These connection states are recorded as a set of fe...
Patrick LaRoche, A. Nur Zincir-Heywood
ISICA
2009
Springer
14 years 29 days ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 6 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
SOFTCOMP
2010
13 years 4 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
ASIAMS
2008
IEEE
14 years 27 days ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...