Sciweavers

106 search results - page 9 / 22
» Mining Audit Data to Build Intrusion Detection Models
Sort
View
ALT
2010
Springer
15 years 1 months ago
Contrast Pattern Mining and Its Application for Building Robust Classifiers
: The ability to distinguish, differentiate and contrast between different data sets is a key objective in data mining. Such ability can assist domain experts to understand their d...
Kotagiri Ramamohanarao
121
Voted
ACSAC
2003
IEEE
15 years 3 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
ESORICS
2006
Springer
15 years 3 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
JAIR
2010
181views more  JAIR 2010»
14 years 6 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
109
Voted
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
16 years 2 days ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik