Sciweavers

531 search results - page 14 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
TEC
2002
89views more  TEC 2002»
14 years 11 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
IDEAL
2010
Springer
14 years 10 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
CAV
2005
Springer
139views Hardware» more  CAV 2005»
15 years 5 months ago
The Orchids Intrusion Detection Tool
ORCHIDS is an intrusion detection tool based on techniques for fast, on-line model-checking. Temporal formulae are taken from a temporal logic tailored to the description of intrus...
Julien Olivain, Jean Goubault-Larrecq
SOFTCOMP
2010
14 years 10 months ago
Approaching Real-Time Intrusion Detection through MOVICAB-IDS
Abstract This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time proces...
Martí Navarro, Álvaro Herrero, Emili...
ICDCS
2003
IEEE
15 years 5 months ago
Integrated Access Control and Intrusion Detection for Web Servers
Current intrusion detection systems work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between thes...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, L...