Anomaly-based intrusion detection system

Results: 13



#Item
1Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
2Statistics / Computer security / Data mining / Denial-of-service attack / Genetic programming / Anomaly detection / Anomaly-based intrusion detection system / Computer network security / Intrusion detection system / Cyberwarfare

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2006-12-26 09:46:58
3Cyberwarfare / Computing / Anomaly detection / Data mining / Intrusion detection system / Misuse detection / Anomaly-based intrusion detection system / Bro / Intrusion detection system evasion techniques / Computer network security / Computer security / Data security

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2006-07-14 18:58:00
4Data mining / Anomaly detection / Intrusion detection system / Computer security / Anomaly / Misuse detection / Outlier / Anomaly-based intrusion detection system / Statistics / Data security / Data analysis

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-10 13:37:55
5Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
6Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
7Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
8Information technology management / Computing / Anomaly detection / Data mining / Data modeling / Query string / Misuse detection / Database / Intrusion detection system / Data security / Database theory / Data management

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
9Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
10Antivirus software / Intrusion detection system / Computing / Threat / Immune system / Computer virus / Artificial intelligence / AAFID / Anomaly-based intrusion detection system / Computer security / Computer network security / Cyberwarfare

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00
UPDATE