Sciweavers

145 search results - page 15 / 29
» Unsupervised Anomaly Detection in Network Intrusion Detectio...
Sort
View
111
Voted
JPDC
2006
129views more  JPDC 2006»
15 years 1 months ago
LAD: Localization anomaly detection for wireless sensor networks
In wireless sensor networks (WSNs), sensors' locations play a critical role in many applications. Having a GPS receiver on every sensor node is costly. In the past, a number ...
Wenliang Du, Lei Fang, Peng Ning
CISIM
2008
IEEE
15 years 8 months ago
Evolution Induced Secondary Immunity: An Artificial Immune System Based Intrusion Detection System
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
Divyata Dal, Siby Abraham, Ajith Abraham, Sugata S...
121
Voted
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 2 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
EWSN
2008
Springer
16 years 1 months ago
Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks
In this paper3 , we use Bayesian Networks as a means for unsupervised learning and anomaly (event) detection in gas monitoring sensor networks for underground coal mines. We show t...
X. Rosalind Wang, Joseph T. Lizier, Oliver Obst, M...
136
Voted
IJISEC
2008
188views more  IJISEC 2008»
15 years 11 days ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...