A semantic approach to host-based intrusion detection systems using contiguousand discontiguous system call patterns

G Creech, J Hu - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
Host-based anomaly intrusion detection system design is very challenging due to the
notoriously high false alarm rate. This paper introduces a new host-based anomaly intrusion …

Generation of a new IDS test dataset: Time to retire the KDD collection

G Creech, J Hu - 2013 IEEE wireless communications and …, 2013 - ieeexplore.ieee.org
Intrusion detection systems are generally tested using datasets compiled at the end of last
century, justified by the need for publicly available test data and the lack of any other …

Analogical reasoning and cyber security

DJ Betz, T Stevens - Security Dialogue, 2013 - journals.sagepub.com
This article is an attempt to interrogate some of the predominant forms of analogical
reasoning within current cyber-security discourse, with a view to clarifying their unstated …

System and method for creating a customized installation on demand

RA Wipfel - US Patent 8,468,518, 2013 - Google Patents
US8468518B2 - System and method for creating a customized installation on demand -
Google Patents US8468518B2 - System and method for creating a customized installation …

Genetic optimized artificial immune system in spam detection: a review and a model

RA Zitar, A Hamdan - Artificial Intelligence Review, 2013 - Springer
Spam is a serious universal problem which causes problems for almost all computer users.
This issue affects not only normal users of the internet, but also causes a big problem for …

System for creating a customized software distribution based on user requirements

SA Isaacson, EWB Anderson, R Wipfel - US Patent 8,352,935, 2013 - Google Patents
Us 2006/0265702 A1 Nov. 23, 2006 Assistant Examiner* Hanh T B111 (74) Attorney, Agent,
or Firm* Marger Johnson & (51) Int. Cl. McCollom PC G06F 9/45(2006.01) G06F …

An immunity inspired anomaly detection system: a general framework

S Praneet, B Verma, S Sharma - … on Bio-Inspired Computing: Theories and …, 2013 - Springer
Exponential growth of internet acted as a centrifugal force in the development of a whole
new array of applications and services which drives the e-business/commerce globally. Now …

A user behavior monitoring and profiling scheme for masquerade detection

A Garg, S Upadhyaya, K Kwiat - Handbook of Statistics, 2013 - Elsevier
Masquerading attack refers to conducting malicious activities on a computer system by
impersonating another user. Such attacks are difficult to detect with standard intrusion …

Assessing hypermutation operators of a clonal selection algorithm for the unequal area facility layout problem

BH Ulutas, S Kulturel-Konak - Engineering Optimization, 2013 - Taylor & Francis
A mutation operator is critical for the performance of a clonal selection algorithm (CSA) since
it diversifies the search directions and avoids early convergence to local optima. This article …

Accuracy evaluation of a credit card fraud detection system on Hadoop MapReduce

E Hormozi, MK Akbari, H Hormozi… - The 5th conference on …, 2013 - ieeexplore.ieee.org
In digitalization era, credit card fraud detection is of high significance to financial
organizations. This paper discussed about credit card fraud detection by parallelizing of …