The problem of previous approaches in anomaly detection in Intrusion Detection System (IDS) is to provide only binary detection result; intrusion or normal. This is a main cause of high false rates and inaccurate detection rates in IDS. In this paper, we propose a new approach named Quantitative Intrusion Intensity Assessment (QIIA). QIIA exploits feature selection and proximity metrics computation so that it provides intrusion (or normal) quantitative intensity value. It is capable of representing how an instance of audit data is proximal to intrusion or normal in the form of a numerical value. Prior to applying QIIA to audit data, we perform feature selection and parameters optimization of detection model in order not only to decrease the...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Intrusion detection systems are tools that detect and remedy the presence of malicious activities. I...
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Intrusion Detection System (IDS) should guarantee high detection rates with minimum overheads to fig...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. Th...
Although using statistical modeling techniques for detecting anomaly intrusion and profiling user be...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Every day the number of devices interacting through telecommunications networks grows resulting into...
Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient mod...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Intrusion detection systems are tools that detect and remedy the presence of malicious activities. I...
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Intrusion Detection System (IDS) should guarantee high detection rates with minimum overheads to fig...
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques...
Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. Th...
Although using statistical modeling techniques for detecting anomaly intrusion and profiling user be...
Many organizations and businesses are all delving into crafting out an online presence for themselve...
Every day the number of devices interacting through telecommunications networks grows resulting into...
Intrusion detection has drawn considerable interest as researchers endeavor to produce efficient mod...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Abstract: Due to continuous growth of the Internet technology, it needs to establish security mechan...
Intrusion detection systems are tools that detect and remedy the presence of malicious activities. I...
This paper proposes an anomaly-based Intrusion Detection System (IDS), which flags anomalous network...