A machine learning approach to anomaly detection

PK Chan, MV Mahoney, MH Arshad - 2003 - repository.fit.edu
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

Learning rules and clusters for anomaly detection in network traffic

PK Chan, MV Mahoney, MH Arshad - Managing Cyber Threats: Issues …, 2005 - Springer
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

A survey of anomaly intrusion detection techniques

Y Yu - Journal of Computing Sciences in Colleges, 2012 - dl.acm.org
Intrusion detection systems are based on two fundamental approaches: the detection of
anomalous behavior as it deviates from normal behavior, and misuse detection by …

Modern intrusion detection, data mining, and degrees of attack guilt

S Noel, D Wijesekera, C Youman - Applications of data mining in computer …, 2002 - Springer
This chapter examines the state of modern intrusion detection, with a particular emphasis on
the emerging approach of data mining. The discussion parallels two important aspects of …

A review of machine learning based anomaly detection techniques

H Kaur, G Singh, J Minhas - arXiv preprint arXiv:1307.7286, 2013 - arxiv.org
Intrusion detection is so much popular since the last two decades where intrusion is
attempted to break into or misuse the system. It is mainly of two types based on the …

Machine learning applications in misuse and anomaly detection

J Sen, S Mehtab - Security and privacy from a legal, ethical, and …, 2020 - books.google.com
Abstract Machine learning and data mining algorithms play important roles in designing
intrusion detection systems. Based on their approaches toward the detection of attacks in a …

Machine learning techniques for anomaly detection: an overview

O Salima, N Asri, HJ Hamid - 2013 - 64.226.120.165
Intrusion detection has gain a broad attention and become a fertile field for several
researches, and still being the subject of widespread interest by researchers. The intrusion …

[HTML][HTML] A study in using neural networks for anomaly and misuse detection

AK Ghosh, A Schwartzbard - 8th USENIX Security Symposium (USENIX …, 1999 - usenix.org
Current intrusion detection systems lack the ability to generalize from previously observed
attacks to detect even slight variations of known attacks. This paper describes new process …

[PDF][PDF] Markov Chains, Classifiers, and Intrusion Detection.

S Jha, KMC Tan, RA Maxion - csfw, 2001 - pages.cs.wisc.edu
This paper presents a statistical anomaly detection algorithm based on Markov chains. Our
algorithm can be directly applied for intrusion detection by discovering anomalous activities …

[图书][B] Machine learning techniques for the computer security domain of anomaly detection

TD Lane - 2000 - search.proquest.com
In this dissertation, we examine the machine learning issues raised by the domain of
anomaly detection for computer security. The anomaly detection task is to recognize the …