Sciweavers

145 search results - page 21 / 29
» Unsupervised Anomaly Detection in Network Intrusion Detectio...
Sort
View
ICAC
2008
IEEE
15 years 6 months ago
Clustering Analysis for the Management of Self-Monitoring Device Networks
Abstract— The increasing computing and communication capabilities of multi-function devices (MFDs) have enabled networks of such devices to provide value-added services. This has...
Andres Quiroz, Manish Parashar, Nathan Gnanasamban...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 3 days ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 9 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
RAID
2004
Springer
15 years 5 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
JSAC
2006
93views more  JSAC 2006»
14 years 11 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....