Sciweavers

1244 search results - page 14 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
15 years 12 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
CN
2007
179views more  CN 2007»
14 years 11 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
109
Voted
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
16 years 1 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...
IJCNN
2000
IEEE
15 years 4 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady