Application of SVM and ANN for intrusion detection

WH Chen, SH Hsu, HP Shen - Computers & Operations Research, 2005 - Elsevier
The popularization of shared networks and Internet usage demands increases attention on
information system security, particularly on intrusion detection. Two data mining …

Events detection for an audio-based surveillance system

C Clavel, T Ehrette, G Richard - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
The present research deals with audio events detection in noisy environments for a
multimedia surveillance application. In surveillance or homeland security most of the …

Learning intrusion detection: supervised or unsupervised?

P Laskov, P Düssel, C Schäfer, K Rieck - Image Analysis and Processing …, 2005 - Springer
Application and development of specialized machine learning techniques is gaining
increasing attention in the intrusion detection community. A variety of learning techniques …

A learning-based approach to the detection of SQL attacks

F Valeur, D Mutz, G Vigna - Detection of Intrusions and Malware, and …, 2005 - Springer
Web-based systems are often a composition of infrastructure components, such as web
servers and databases, and of application-specific code, such as HTML-embedded scripts …

A multi-model approach to the detection of web-based attacks

C Kruegel, G Vigna, W Robertson - Computer Networks, 2005 - Elsevier
Web-based vulnerabilities represent a substantial portion of the security exposures of
computer networks. In order to detect known web-based attacks, misuse detection systems …

[PDF][PDF] Automating mimicry attacks using static binary analysis

C Kruegel, E Kirda, D Mutz, W Robertson… - USENIX Security …, 2005 - usenix.org
Intrusion detection systems that monitor sequences of system calls have recently become
more sophisticated in defining legitimate application behavior. In particular, additional …

Lad: Localization anomaly detection for wireless sensor networks

W Du, L Fang, P Ningi - 19th IEEE International Parallel and …, 2005 - ieeexplore.ieee.org
In wireless sensor networks (WSNs), sensors' locations play a critical role in many
applications. Having a GPS receiver on every sensor node is costly. In the past, a number of …

Learning classifiers for misuse and anomaly detection using a bag of system calls representation

DK Kang, D Fuller, V Honavar - Proceedings from the Sixth …, 2005 - ieeexplore.ieee.org
In this paper, we propose a" bag of system calls" representation for intrusion detection in
system call sequences and describe misuse and anomaly detection results with standard …

Application of online-training SVMs for real-time intrusion detection with different considerations

Z Zhang, H Shen - Computer Communications, 2005 - Elsevier
As intrusion detection essentially can be formulated as a binary classification problem, it
thus can be solved by an effective classification technique—Support Vector Machine (SVM) …

Method of and system for detecting an anomalous operation of a computer system

JC Munson, SG Elbaum - US Patent 6,963,983, 2005 - Google Patents
(57) ABSTRACT A real-time approach for detecting aberrant modes of System behavior
induced by abnormal and unauthorized System activities that are indicative of an intrusive …