Statistical learning for anomaly detection in cloud server systems: A multi-order Markov chain framework

W Sha, Y Zhu, M Chen, T Huang - IEEE transactions on cloud …, 2015 - ieeexplore.ieee.org
As a major strategy to ensure the safety of IT infrastructure, anomaly detection plays a more
important role in cloud computing platform which hosts the entire applications and data. On …

A multi-order markov chain based scheme for anomaly detection

W Sha, Y Zhu, T Huang, M Qiu, Y Zhu… - 2013 IEEE 37th …, 2013 - ieeexplore.ieee.org
This paper presents a feasible multi-order Markov chain based scheme for anomaly
detection in server systems. In our approach, both the high-order Markov chain and …

An improved ant colony clustering method for network intrusion detection

M Lingxi, S Guang - 2013 IEEE Eighth International Conference …, 2013 - ieeexplore.ieee.org
Intrusion detection is an important aspect of the network information safety. For the
disadvantage that the existing intrusion detection method is not comprehensive of various …

[PDF][PDF] Performance evaluation of intrusion detection systems using ANN

KAA Omer, FA Awn - Egyptian Computer Science Journal, 2015 - ecsjournal.org
During the last decades, Intrusion Detection System (IDS) has attracted the attention of
researchers to provide security for sensitive information that is communicated via unsecure …

Improving performance and convergence rates in multi-layer feed forward neural network intrusion detection systems: A review of the literature

LL Ray, H Felch - … Journal of Strategic Information Technology and …, 2014 - igi-global.com
Today's anomaly-based network intrusion detection systems (IDSs) are plagued with
detecting new and unknown attacks. The review of the literature builds ideas for researching …

Mitigating service impersonation attacks in clouds

R Gamble, S AlQahtani - 2016 Future Technologies Conference …, 2016 - ieeexplore.ieee.org
Providing security for interacting cloud services requires more than user authentication with
passwords or digital certificates and confidentiality in data transmission. Existing data …

Consonant Passwords in the Fingers (1)

Y Zhu, H Qin, C Pan - 2011 International Conference on Future …, 2011 - ieeexplore.ieee.org
Language has interactive and random characteristics, someone had said that the language
could not be located. We intend to solve the problem: the location of the Chinese Alphabetic …

A RMT and PCA-based method of monitoring the large-scale traffic pattern

J Liu, D Jin, J Yuan, W Zhang, L Su… - 2009 Third Asia …, 2009 - ieeexplore.ieee.org
Mechanisms to extract the characteristics of network traffic play a significant role in the traffic
monitoring, offering helpful information for network management and control. In this paper, a …

[引用][C] 一种改进蚁群聚类的入侵检测方法

姜参, 王大伟 - 计算机技术与发展, 2013

[引用][C] ﺖﯾﺎﺳ ﺐﻠﺘﻣ

B BAC - 2014 - University of Toronto