Sciweavers

479 search results - page 3 / 96
» Intrusion Detection Based on Data Mining
Sort
View
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
15 years 1 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 1 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
SAC
2004
ACM
15 years 5 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
16 years 1 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...