Adaboost-based algorithm for network intrusion detection

W Hu, W Hu, S Maybank - IEEE Transactions on Systems, Man …, 2008 - ieeexplore.ieee.org
Network intrusion detection aims at distinguishing the attacks on the Internet from normal
use of the Internet. It is an indispensable part of the information security system. Due to the …

Poseidon: a 2-tier anomaly-based network intrusion detection system

D Bolzoni, S Etalle, P Hartel - Fourth IEEE International …, 2006 - ieeexplore.ieee.org
We present POSEIDON, a new anomaly-based network intrusion detection system.
POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a self …

Network intrusion detection in covariance feature space

S Jin, DS Yeung, X Wang - Pattern Recognition, 2007 - Elsevier
Detecting multiple and various network intrusions is essential to maintain the reliability of
network services. The problem of network intrusion detection can be regarded as a pattern …

Makine öğrenmesi ve öznitelik seçim yöntemleriyle saldırı tespiti

O Kaynar, H Arslan, Y Görmez, YE Işık - Bilişim Teknolojileri Dergisi, 2018 - dergipark.org.tr
Bilgisayar ve internetin, günlük yaşamın vazgeçilmez bir unsuru haline gelmesi ile birlikte
internet sitelerinin ve web tabanlı uygulamaların sayısı da hızla artmıştır. Bilgi, fikir, para gibi …

Intrusion detection with autoencoder based deep learning machine

O Kaynar, AG Yüksek, Y Görmez… - 2017 25th Signal …, 2017 - ieeexplore.ieee.org
In changing and constantly evolving information age, together with the developments in
computer and internet technology, the production, digitization, storage and sharing of …

Network-based intrusion detection using Adaboost algorithm

W Hu, W Hu - The 2005 IEEE/WIC/ACM International …, 2005 - ieeexplore.ieee.org
Intrusion detection on the Internet is a heated research field in computer science, where
much work has been done during the past two decades. In this paper, we build a network …

Explanations of unsupervised learning clustering applied to data security analysis

G Corral, E Armengol, A Fornells, E Golobardes - Neurocomputing, 2009 - Elsevier
Network security tests should be periodically conducted to detect vulnerabilities before they
are exploited. However, analysis of testing results is resource intensive with many data and …

Approaches in anomaly-based network intrusion detection systems

D Bolzoni, S Etalle - Intrusion Detection Systems, 2008 - Springer
Anomaly-based network intrusion detection systems (NIDSs) can take into consideration
packet headers, the payload, or a combination of both. We argue that payload-based …

Analysis of vulnerability assessment results based on CAOS

G Corral, A Garcia-Piquer, A Orriols-Puig… - Applied Soft …, 2011 - Elsevier
Information system security must battle regularly with new threats that jeopardize the
protection of those systems. Security tests have to be run periodically not only to identify …

Multiobjective evolutionary clustering approach to security vulnerability assesments

G Corral, A Garcia-Piquer, A Orriols-Puig… - … Intelligence Systems: 4th …, 2009 - Springer
Network vulnerability assessments collect large amounts of data to be further analyzed by
security experts. Data mining and, particularly, unsupervised learning can help experts …