This chapter examines the state of modern intrusion detection, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects of intrusion detection: general detection strategy (misuse detection versus anomaly detection) and data source (individual hosts versus network traffic). Misuse detection attempts to match known patterns of intrusion, while anomaly detection searches for deviations from normal behavior. Between the two approaches, only anomaly detection has the ability to detect unknown attacks. A particularly promising approach to anomaly detection combines association mining with other forms of machine learning such as classification. Moreover, the data source that an intrusion de...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Intrusion detection has received enormous attention from the beginning of computer network technolog...
Despite of growing information technology widely, security has remained one challenging area for com...
ABSTRACT: Intrusion detection is an essential and important technique in research field. We propose ...
Intrusion detection system has become an important component of a network infrastructure protection ...
Abstract Data mining techniques have been successfully applied in many differ-ent fields including m...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Intrusion Detection System used to discover attacks against computers and network Infrastructures. T...
Abstract: This paper analysis and criticizes the way of using, functioning the intrusion detection s...
Machine learning and data mining algorithms play important roles in designing intrusion detection sy...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
In recent years, network based services and network based attacks have grown significantly. The netw...
Intrusion detection has received enormous attention from the beginning of computer network technolog...
In The extensive growth of computing networks and tools and tricks for intruding into and attacking ...
Abstract. Assurance technologies for computer security have failed to have significant impacts in th...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Intrusion detection has received enormous attention from the beginning of computer network technolog...
Despite of growing information technology widely, security has remained one challenging area for com...
ABSTRACT: Intrusion detection is an essential and important technique in research field. We propose ...
Intrusion detection system has become an important component of a network infrastructure protection ...
Abstract Data mining techniques have been successfully applied in many differ-ent fields including m...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Intrusion Detection System used to discover attacks against computers and network Infrastructures. T...
Abstract: This paper analysis and criticizes the way of using, functioning the intrusion detection s...
Machine learning and data mining algorithms play important roles in designing intrusion detection sy...
This paper aims to research various data mining techniques applied to solve intrusion detection prob...
In recent years, network based services and network based attacks have grown significantly. The netw...
Intrusion detection has received enormous attention from the beginning of computer network technolog...
In The extensive growth of computing networks and tools and tricks for intruding into and attacking ...
Abstract. Assurance technologies for computer security have failed to have significant impacts in th...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Intrusion detection has received enormous attention from the beginning of computer network technolog...
Despite of growing information technology widely, security has remained one challenging area for com...