Use of k-nearest neighbor classifier for intrusion detection

Y Liao, VR Vemuri - Computers & security, 2002 - Elsevier
A new approach, based on the k-Nearest Neighbor (kNN) classifier, is used to classify
program behavior as normal or intrusive. Program behavior, in turn, is represented by …

Specification-based anomaly detection: a new approach for detecting network intrusions

R Sekar, A Gupta, J Frullo, T Shanbhag… - Proceedings of the 9th …, 2002 - dl.acm.org
Unlike signature or misuse based intrusion detection techniques, anomaly detection is
capable of detecting novel attacks. However, the use of anomaly detection in practice is …

Multivariate statistical analysis of audit trails for host-based intrusion detection

N Ye, SM Emran, Q Chen… - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
Intrusion detection complements prevention mechanisms, such as firewalls, cryptography,
and authentication, to capture intrusions into an information system while they are acting on …

An artificial immune system architecture for computer security applications

PK Harmer, PD Williams, GH Gunsch… - IEEE transactions on …, 2002 - ieeexplore.ieee.org
With increased global interconnectivity and reliance on e-commerce, network services and
Internet communication, computer security has become a necessity. Organizations must …

[PDF][PDF] Negative selection: How to generate detectors

M Ayara, J Timmis, R de Lemos… - Proceedings of the …, 2002 - researchgate.net
The immune system is a remarkable and complex natural system, which has been shown to
be of interest to computer scientists and engineers alike. This paper reports an on-going …

[PDF][PDF] Computer immunology

LWY Lau - 2002 - priv.gg
Computer Immunology Page 1 Computer Immunology by Lyanne Wai-Yin Lau Supervised by
Daniel Bradley A thesis submitted to The Department of Information Technology and Electrical …

Incorporating soft computing techniques into a probabilistic intrusion detection system

SB Cho - IEEE Transactions on Systems, Man, and …, 2002 - ieeexplore.ieee.org
There are a lot of industrial applications that can be solved competitively by hard computing,
while still requiring the tolerance for imprecision and uncertainty that can be exploited by soft …

A new classifier based on resource limited artificial immune systems

A Watkins, L Boggess - Proceedings of the 2002 Congress on …, 2002 - ieeexplore.ieee.org
This paper presents a new tool for supervised learning, modeled on resource limited
Artificial Immune Systems. A supervised learning system, it is self-regulatory, efficient, and …

Robustness of Chi‐square and Canberra distance metrics for computer intrusion detection

SM Emran, N Ye - Quality and Reliability Engineering …, 2002 - Wiley Online Library
Intrusion detection complements intrusion prevention mechanisms, such as firewalls,
cryptography, and authentication, to capture intrusions into an information system while they …

[图书][B] Integrating artificial immune algorithms for intrusion detection

JW Kim - 2002 - search.proquest.com
This thesis focuses on the combination of a set of artificial immune algorithms and their
application to intrusion detection. Three evolutionary algorithms are investigated, each …