In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is possible to achieve better results than by using a single signal. We further show that by applying this approach to a real-world email dataset the algorithm works for email worm detection. Dempster-Shafer can be a promising method for anomaly detection problems with multiple features (data sources), and two or more classes
Copyright © 2014 Yuan Liu et al.This is an open access article distributed under the Creative Common...
Abstract: Spam has become an important problem for computer security because it is a channel for the...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Network anomaly detection has been focused on by more people with the fast development of computer n...
Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber...
The number of people connected to the internet is swiftly growing, and technology is increasingly in...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
As the research increased in computer science highlight the scientists mind for the growing research...
In this paper we discuss our research in developing general and systematic methods for intrusion det...
Copyright © 2014 Yuan Liu et al.This is an open access article distributed under the Creative Common...
Abstract: Spam has become an important problem for computer security because it is a channel for the...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two ...
While the Dempster-Shafer theory of evidence has been widely used in anomaly detection, there are so...
In our present work we introduce the use of data fusion in the field of DoS anomaly detection. We pr...
Unlike signature or misuse based intrusion detection techniques, anomaly detection is capable of det...
Network servers are vulnerable to attack, and this state of affairs shows no sign of abating. Theref...
Intrusion detection systems (IDS) play a critical role in network security by monitoring systems and...
Network anomaly detection has been focused on by more people with the fast development of computer n...
Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber...
The number of people connected to the internet is swiftly growing, and technology is increasingly in...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
As the research increased in computer science highlight the scientists mind for the growing research...
In this paper we discuss our research in developing general and systematic methods for intrusion det...
Copyright © 2014 Yuan Liu et al.This is an open access article distributed under the Creative Common...
Abstract: Spam has become an important problem for computer security because it is a channel for the...
Existing anomaly detection systems do not reliably produce accurate severity ratings for detected ne...