Sciweavers

345 search results - page 26 / 69
» Using Active Learning in Intrusion Detection
Sort
View
ICML
2006
IEEE
15 years 11 months ago
Active sampling for detecting irrelevant features
The general approach for automatically driving data collection using information from previously acquired data is called active learning. Traditional active learning addresses the...
Sriharsha Veeramachaneni, Emanuele Olivetti, Paolo...
76
Voted
NDSS
2005
IEEE
15 years 4 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
ICCCN
2007
IEEE
15 years 5 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
IMC
2009
ACM
15 years 5 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
CVPR
2003
IEEE
16 years 25 days ago
Activity Recognition Using the Dynamics of the Configuration of Interacting Objects
Monitoring activities using video data is an important surveillance problem. A special scenario is to learn the pattern of normal activities and detect abnormal events from a very...
Namrata Vaswani, Amit K. Roy Chowdhury, Rama Chell...