Sciweavers

531 search results - page 16 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
RAID
1999
Springer
15 years 5 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
13 years 3 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
16 years 2 months ago
SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams
In this paper, we present a new technique, called Stream Projected Ouliter deTector (SPOT), to deal with outlier detection problem in high-dimensional data streams. SPOT is unique ...
Ji Zhang, Qigang Gao, Hai H. Wang
ACSAC
2004
IEEE
15 years 5 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 7 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...