This paper presents a novel network intrusion detection method that searches for frequency patterns within the time series created by network traffic signals. The new strategy is aimed for, but not limited to, detecting DOS and Probe attacks. The detection method is based on the observation that such kind of attacks are most likely manipulated by scripted code, which often result in periodicity patterns in either packet streams or the connection arrivals. Thus, by applying Fourier analysis to the time series created by net-work traffic signals, we could identify whether periodicity patterns exist in the traffic. We demonstrate the effective-ness of this frequency-mining strategy based on the syn-thetic network intrusion data from the DARPA ...
The increasing number of network attacks causes growing problems for network operators and users. No...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Research on network security and intrusion detection strategies presents many challenging issues to ...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Due to the growing risks associated with owning a computer, most individuals and businesses run one ...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
The goal of intrusion detection is to identify attempted or ongoing attacks on a computer system or ...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
UnrestrictedInternet traffic contains a rich set of periodic patterns. Examples include regular pack...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
Due to the dramatically increment of internet usage, users are facing various attacks da...
Intrusion detection system has become an important component of a network infrastructure protection ...
The increasing number of network attacks causes growing problems for network operators and users. No...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Research on network security and intrusion detection strategies presents many challenging issues to ...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Due to the growing risks associated with owning a computer, most individuals and businesses run one ...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
The goal of intrusion detection is to identify attempted or ongoing attacks on a computer system or ...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
UnrestrictedInternet traffic contains a rich set of periodic patterns. Examples include regular pack...
ABSTRACT: We present a new datamining approach to generating frequent episode rules for building ano...
Due to the dramatically increment of internet usage, users are facing various attacks da...
Intrusion detection system has become an important component of a network infrastructure protection ...
The increasing number of network attacks causes growing problems for network operators and users. No...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
Through continuous observation and modelling of normal behavior in networks, Anomaly-based Network I...