Sciweavers

531 search results - page 49 / 107
» Unsupervised learning techniques for an intrusion detection ...
Sort
View
CAEPIA
2003
Springer
15 years 6 months ago
Enhancing Consistency Based Diagnosis with Machine Learning Techniques
This paper proposes a diagnosis architecture that integrates consistency based diagnosis with induced time series classifiers, trying to combine the advantages of both methods. Co...
Carlos J. Alonso, Juan José Rodrígue...
ACSAC
2004
IEEE
15 years 5 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
CORR
2002
Springer
100views Education» more  CORR 2002»
15 years 1 months ago
A neural model for multi-expert architectures
We present a generalization of conventional artificial neural networks that allows for a functional equivalence to multi-expert systems. The new model provides an architectural fr...
Marc Toussaint
96
Voted
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 5 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...