While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are some issues with them. Dempster-Shafer theory of evidence trusts evidences equally which does not hold in distributed-sensor ADS. Moreover, evidences are dependent with each other sometimes which will lead to false alert. We propose improving by incorporating two algorithms. Features selection algorithm employs Gaussian Graphical Models to discover correlation between some candidate features. A group of suitable ADS were selected to detect and detection result were send to the fusion engine. Information gain is applied to set weight for every feature on Weights estimated algorithm. A weighted Dempster-Shafer theory of evidence combined the dete...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estima...
The efficacy of data mining lies in its ability to identify relationships amongst data. This chapter...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
Copyright © 2014 Yuan Liu et al.This is an open access article distributed under the Creative Common...
Network anomaly detection has been focused on by more people with the fast development of computer n...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challen...
Dempster-Shafer evidence theory is widely used in the fields of decision level information fusion. I...
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent ...
This article addresses the performance of Dempster-Shafer (DS) theory, when it is slightly modified ...
Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used t...
The method of reasoning with uncertain information known as Dempster-Shafer theory arose from the re...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estima...
The efficacy of data mining lies in its ability to identify relationships amongst data. This chapter...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
Copyright © 2014 Yuan Liu et al.This is an open access article distributed under the Creative Common...
Network anomaly detection has been focused on by more people with the fast development of computer n...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
Anomaly detection from Big Cybersecurity Datasets is very important; however, this is a very challen...
Dempster-Shafer evidence theory is widely used in the fields of decision level information fusion. I...
Anomaly detection (AD) has captured a significant amount of focus from the research field in recent ...
This article addresses the performance of Dempster-Shafer (DS) theory, when it is slightly modified ...
Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used t...
The method of reasoning with uncertain information known as Dempster-Shafer theory arose from the re...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Network traffic anomalies stand for a large fraction of the Internet traffic andcompromise the perfo...
The Dempster-Shafer (D-S) theory provides a method to combine evidence from multiple nodes to estima...
The efficacy of data mining lies in its ability to identify relationships amongst data. This chapter...