Much of the intrusion detection research focuses on signature (misuse) detection, where models are built to recognize known attacks. However, signature detection, by its nature …
JP Early, CE Brodley - Machine learning and data mining for computer …, 2006 - Springer
Research in network intrusion detection has traditionally been divided into two components– misuse detection and anomaly detection. The distinction between the two comes from the …
S Noel, D Wijesekera, C Youman - Applications of data mining in computer …, 2002 - Springer
This chapter examines the state of modern intrusion detection, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects of …
F Bouchama, M Kamal - International Journal of Business …, 2021 - research.tensorgate.org
Cyber threats and data breaches have become more sophisticated and stealthier over time. Traditional rule-based intrusion detection systems fail to detect many modern attacks. This …
The current approach to detecting novel attacks in network traffic is to model the normal frequency of session IP addresses and server port usage and to signal unusual …
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has …
MS Narayana, B Prasad, A Srividhya… - International Journal of …, 2011 - academia.edu
HE explosive increase in the number of networked machines and the widespread use of the internet in organizations have led to an increase in the number of unauthorized activities, not …
A popular approach for detecting network intrusion attempts is to monitor the network traffic for anomalies. Extensive research effort has been invested in anomaly-based network …
In recent years, hacking has become an industry unto itself, increasing the number and diversity of cyber attacks. Threats on computer networks range from malware to denial of …