Sciweavers

145 search results - page 21 / 29
» Unsupervised Anomaly Detection in Network Intrusion Detectio...
Sort
View
ICAC
2008
IEEE
15 years 4 months ago
Clustering Analysis for the Management of Self-Monitoring Device Networks
Abstract— The increasing computing and communication capabilities of multi-function devices (MFDs) have enabled networks of such devices to provide value-added services. This has...
Andres Quiroz, Manish Parashar, Nathan Gnanasamban...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
15 years 10 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
74
Voted
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
15 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
RAID
2004
Springer
15 years 3 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
JSAC
2006
93views more  JSAC 2006»
14 years 9 months ago
Intrusion Detection Routers: Design, Implementation and Evaluation Using an Experimental Testbed
Abstract--In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-servic...
Eric Y. K. Chan, H. W. Chan, K. M. Chan, Vivien P....