International audienceIn this work, we propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection over unlabeled HTTP traffic streams in computer networks. The framework holds potential for self-managing: self-labeling, self-updating and self-adapting. Our framework employs the Affinity Propagation (AP) algorithm to learn a subject's behaviors through dynamical clustering of the streaming data. It automatically labels the data and adapts to normal behavior changes while identifies anomalies. Two large real HTTP traffic streams collected in our institute as well as a set of benchmark KDD'99 data are used to validate the framework and the method. The test results show that the autonomic mo...
Critical networks require defence in depth incorporating many different security technologies includ...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
Abstract—Recently, research on intrusion detection in computer systems has received much attention t...
International audienceIn this work, we propose a novel framework of autonomic intrusion detection th...
Abstract. We propose a novel framework of autonomic intrusion de-tection that fulfills online and ad...
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with ...
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with ...
The rapid growth and deployment of network technologies and Internet services has made security and ...
The rapid growth of the internet, connecting billions of people and businesses, brings with it an in...
International audienceDetection of web attacks is an important issue in current defense-in-depth sec...
Today, network security is crucial due to the rapid development of network and internet technologies...
Abstract—Anomaly-based intrusion detection systems classify network traffic instances by comparing t...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
The evolution of the web server contents and the emergence of new kinds of intrusions make necessary...
Critical networks require defence in depth incorporating many different security technologies includ...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
Abstract—Recently, research on intrusion detection in computer systems has received much attention t...
International audienceIn this work, we propose a novel framework of autonomic intrusion detection th...
Abstract. We propose a novel framework of autonomic intrusion de-tection that fulfills online and ad...
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with ...
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with ...
The rapid growth and deployment of network technologies and Internet services has made security and ...
The rapid growth of the internet, connecting billions of people and businesses, brings with it an in...
International audienceDetection of web attacks is an important issue in current defense-in-depth sec...
Today, network security is crucial due to the rapid development of network and internet technologies...
Abstract—Anomaly-based intrusion detection systems classify network traffic instances by comparing t...
In this paper we discuss our research in developing gen-eral and systematic methods for intrusion de...
Intrusion Detection Systems (IDS's) ensure the security of computer networks by monitoring traffic a...
The evolution of the web server contents and the emergence of new kinds of intrusions make necessary...
Critical networks require defence in depth incorporating many different security technologies includ...
In this paper, we present the design and implementation of a new approach for anomaly detection and ...
Abstract—Recently, research on intrusion detection in computer systems has received much attention t...