[go: up one dir, main page]

Chimphlee et al., 2005 - Google Patents

Unsupervised clustering methods for identifying rare events in anomaly detection

Chimphlee et al., 2005

View PDF
Document ID
17847715334218500726
Author
Chimphlee W
Abdullah A
Sap M
Chimphlee S
Srinoy S
Publication year
Publication venue
a a

External Links

Snippet

It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2408Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Ravipati et al. Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper
Thakkar et al. A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions
Gogoi et al. A survey of outlier detection methods in network anomaly identification
Sharma et al. An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification
Weller-Fahy et al. A survey of distance and similarity measures used within network intrusion anomaly detection
Olusola et al. Analysis of KDD’99 intrusion detection dataset for selection of relevance features
Chauhan et al. A comparative study of classification techniques for intrusion detection
Ibrahimi et al. Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA
Gudadhe et al. A new data mining based network intrusion detection model
Madbouly et al. Relevant feature selection model using data mining for intrusion detection system
Gupta An effective model for anomaly IDS to improve the efficiency
Chimphlee et al. Unsupervised clustering methods for identifying rare events in anomaly detection
Alagrash et al. Comparing the area of data mining algorithms in network intrusion detection
Neethu Adaptive intrusion detection using machine learning
Chaudhari et al. Intrusion detection system: classification, techniques and datasets to implement
Panda et al. SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM.
Asaju et al. Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm
Riad et al. Visualize network anomaly detection by using k-means clustering algorithm
Somwang et al. Computer network security based on support vector machine approach
Bahrololum et al. An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network.
Chimphlee et al. Integrating genetic algorithms and fuzzy C-means for anomaly detection
Jayasimhan et al. Anomaly detection using a clustering technique
Alsulami A review on machine learning based approaches of network intrusion detection systems
Nachan et al. Intrusion Detection System: A Survey
He et al. Detecting anomalous network traffic with combined fuzzy-based approaches