Sciweavers

145 search results - page 7 / 29
» Unsupervised Anomaly Detection in Network Intrusion Detectio...
Sort
View
CN
2007
168views more  CN 2007»
14 years 9 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park
SUTC
2006
IEEE
15 years 3 months ago
Native API Based Windows Anomaly Intrusion Detection Method Using SVM
While many researches of Host Anomaly Detection System using system calls under UNIX/UNIX-like systems have been done but little in Windows systems, we do the similar research und...
Miao Wang, Cheng Zhang, Jingjing Yu
IEEEARES
2006
IEEE
15 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
81
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
ICIP
2007
IEEE
15 years 11 months ago
Unsupervised Modeling of Object Tracks for Fast Anomaly Detection
A key goal of far-field activity analysis is to learn the usual pattern of activity in a scene and to detect statistically anomalous behavior. We propose a method for unsupervised...
Tomas Izo, W. Eric L. Grimson