Abstract—Reliability and quality of service from information systems has been threatened by cyber intrusions. To protect information systems from intrusions and thus assure reliability and quality of service, it is highly desirable to develop techniques that detect intrusions. Many intrusions manifest in anomalous changes in intensity of events occurring in information systems. In this study, we apply, test, and compare two EWMA techniques to detect anomalous changes in event intensity for intrusion detection: EWMA for autocorrelated data and EWMA for uncorrelated data. Different parameter settings and their effects on performance of these EWMA techniques are also investigated to provide guidelines for practical use of these techniques. Ind...
Some computer security breaches cannot be prevented using access and information flow control techni...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Intrusion detection is an important part of networkedsystems security protection. Although commercia...
Intrusion detection is used to monitor and capture intrusions into computer and network systems, whi...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
Intrusion detection systems have a vital role in protecting computer networks and information system...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
EWMA control charts are based on the intuitive idea of accumulating information over the time by exp...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
This paper describes two recently developed intrusion detection algorithms, and gives experimental r...
Some computer security breaches cannot be prevented using access and information flow control techni...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
We present a component anomaly detector for a host-based intrusion detection system (IDS) for Micros...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Some computer security breaches cannot be prevented using access and information flow control techni...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Intrusion detection is an important part of networkedsystems security protection. Although commercia...
Intrusion detection is used to monitor and capture intrusions into computer and network systems, whi...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
Intrusion detection is used to monitor and capture intrusions into computer and network systems whic...
Intrusion detection systems have a vital role in protecting computer networks and information system...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
EWMA control charts are based on the intuitive idea of accumulating information over the time by exp...
We present and empirically analyze a machine-learning approach for detecting intrusions on individua...
This paper describes two recently developed intrusion detection algorithms, and gives experimental r...
Some computer security breaches cannot be prevented using access and information flow control techni...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
We present a component anomaly detector for a host-based intrusion detection system (IDS) for Micros...
Abstract. Intrusion detection corresponds to a suite of techniques that can be used to identify atta...
Some computer security breaches cannot be prevented using access and information flow control techni...
The intrusion detection in computer networks is a complex research problem, which requires the under...
Intrusion detection is an important part of networkedsystems security protection. Although commercia...