Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack variants and novel attacks without a priori knowledge. Current anomaly IDSs are inefficient for real-time detection because of their complex computation. This paper proposes a novel approach to reduce the heavy computational cost of an anomaly IDS. Linear Discriminant Analysis (LDA) and difference distance map are used for selection of significant features. This approach is able to transform high-dimensional feature vectors into a low-dimensional domain. The similarity between new incoming packets and a normal profile is determined using Euclidean distance on the simple, low-dimensional feature domain. The final decision will be made accordin...
Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs)...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack ...
Web serverss and web-based applications are commonly used attack targets. The main issue are how to ...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Web servers and web-based applications are commonly used attack targets. The main issues are how to ...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Web servers and web-based applications are commonly used as attack targets. The main issues ar how t...
Web servers and web-based applications are commonly used as attack targets. The main issues are how ...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Web servers and web-based applications are commonly used as attack targets. The main issues are how ...
Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs)...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...
Anomaly Intrusion Detection System (IDS) is a statistical based network IDS which can detect attack ...
Web serverss and web-based applications are commonly used attack targets. The main issue are how to ...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant...
Intrusion Detection System (IDS) deals with huge amount of network traffic and uses large feature se...
Web servers and web-based applications are commonly used attack targets. The main issues are how to ...
Most current intrusion detection methods cannot process large amounts of audit data for real-time op...
Web servers and web-based applications are commonly used as attack targets. The main issues ar how t...
Web servers and web-based applications are commonly used as attack targets. The main issues are how ...
As information systems become increasingly complex and pervasive, they become inextricably intertwin...
Web servers and web-based applications are commonly used as attack targets. The main issues are how ...
Computational cost is one of the major concerns of the commercial Intrusion Detection Systems (IDSs)...
Over the past few years, intrusion protection systems have drawn a mature research area in the field...
An Intrusion Detection System (IDS) is one of these layers of defense against malicious attacks. In ...