[PDF][PDF] Data mining for network intrusion detection: How to get started

E Bloedorn, AD Christiansen, W Hill, C Skorupka… - 2001 - apps.dtic.mil
Recently there has been much interest in applying data mining to computer network
intrusion detection. For the past two years, MITRE has been exploring how to make data …

[PDF][PDF] Data mining techniques for (network) intrusion detection systems

T Lappas, K Pelechrinis - … of Computer Science and Engineering UC …, 2007 - Citeseer
In Information Security, intrusion detection is the act of detecting actions that attempt to
compromise the confidentiality, integrity or availability of a resource. Intrusion detection does …

A data mining framework for building intrusion detection models

W Lee, SJ Stolfo, KW Mok - … of the 1999 IEEE Symposium on …, 1999 - ieeexplore.ieee.org
There is often the need to update an installed intrusion detection system (IDS) due to new
attack methods or upgraded computing environments. Since many current IDSs are …

Data mining for intrusion detection: A critical review

K Julisch - Applications of data mining in computer security, 2002 - Springer
Data mining techniques have been successfully applied in many different fields including
marketing, manufacturing, process control, fraud detection, and network management. Over …

Data mining-based intrusion detectors: An overview of the columbia ids project

SJ Stolfo, W Lee, PK Chan, W Fan, E Eskin - ACM SIGMOD Record, 2001 - dl.acm.org
The field of Intrusion Detection has been an active area of research for some time. The goal
of an Intrusion Detection System (IDS) is to provide another layer of defense against …

Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility

W Lee - ACM SIGKDD Explorations Newsletter, 2002 - dl.acm.org
Intrusion detection is an essential component of the layered computer security mechanisms.
It requires accurate and efficient models for analyzing a large amount of system and network …

A new data-mining based approach for network intrusion detection

C Dartigue, HI Jang, W Zeng - 2009 Seventh Annual …, 2009 - ieeexplore.ieee.org
Nowadays, as information systems are more open to the Internet, the importance of secure
networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) …

[PDF][PDF] Data mining methods for network intrusion detection

ST Brugger - University of California at Davis, 2004 - Citeseer
Network intrusion detection systems have become a standard component in security
infrastructures. Unfortunately, current systems are poor at detecting novel attacks without an …

Data mining for intrusion detection: techniques, applications and systems

J Pei, SJ Upadhyaya, F Farooq… - … Conference on Data …, 2004 - scholar.archive.org
An intrusion is defined as any set of actions that compromise the integrity, confidentiality or
availability of a resource. Intrusion detection is an important task for information …

[图书][B] Applications of data mining in computer security

D Barbará, S Jajodia - 2002 - books.google.com
Data mining is becoming a pervasive technology in activities as diverse as using historical
data to predict the success of a marketing campaign, looking for patterns in financial …