Sciweavers

1013 search results - page 11 / 203
» Storage-Based Intrusion Detection
Sort
View
AINA
2007
IEEE
15 years 3 months ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong
73
Voted
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
15 years 4 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
14 years 10 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
SP
2010
IEEE
187views Security Privacy» more  SP 2010»
15 years 1 months ago
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
Abstract—In network intrusion detection research, one popular strategy for finding attacks is monitoring a network’s activity for anomalies: deviations from profiles of norma...
Robin Sommer, Vern Paxson
ICAI
2008
14 years 11 months ago
Online Boosting Based Intrusion Detection in Changing Environments
Intrusion detection is an active research field in the development of reliable web-based information systems, where many artificial intelligence techniques are exploited to fit th...
Yanguo Wang, Weiming Hu, Xiaoqin Zhang