International audienceOne-class support vector machines (OCSVM) have been recently applied in intrusion detection. Typically, OCSVM is kernelized by radial basis functions (RBF, or Gaussian kernel) whereas selecting Gaussian kernel hyperparameter is based upon availability of attacks, which is rarely applicable in practice. This paper investigates the application of nested OCSVM to detect intruders in network systems with data-driven hyperparameter optimization. The nested OCSVM is able to improve the efficiency over the proposed OCSVM applied in intrusion detection. In addition , the information of the farthest and the nearest neighbors of each sample is used to construct the objective cost instead of labeling based metrics such as geometr...
Abstract—This paper researches the intrusion detection problem of the network defense, pointing at t...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper we present an intrusion detection module capable of detecting malicious network traffi...
Intrusion detection is a topic of interest in current scenario. Statistical IDS overcomes many pitfa...
With the growth in the use of the Internet and local area networks, malicious attacks and intrusions...
Cyber-security threats are a growing concern in networked environments. The development of Intrusion...
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the netwo...
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the netwo...
Abstract—This paper researches the intrusion detection problem of the network defense, pointing at t...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
International audienceOne-class support vector machines (OCSVM) have been recently applied in intrus...
This paper proposes a method of applying Support Vector Machines to network-based Intrusion Detectio...
Intrusion detection is an emerging area of research in the computer security and networks with the g...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this paper we present an intrusion detection module capable of detecting malicious network traffi...
Intrusion detection is a topic of interest in current scenario. Statistical IDS overcomes many pitfa...
With the growth in the use of the Internet and local area networks, malicious attacks and intrusions...
Cyber-security threats are a growing concern in networked environments. The development of Intrusion...
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the netwo...
Machine learning (ML) techniques learn a system by observing it. Events and occurrences in the netwo...
Abstract—This paper researches the intrusion detection problem of the network defense, pointing at t...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...
International audienceIn the case of network intrusion detection data, pre-processing techniques hav...