Chimphlee et al., 2005 - Google Patents
Unsupervised clustering methods for identifying rare events in anomaly detectionChimphlee et al., 2005
View PDF- Document ID
- 17847715334218500726
- Author
- Chimphlee W
- Abdullah A
- Sap M
- Chimphlee S
- Srinoy S
- Publication year
- Publication venue
- a a
External Links
Snippet
It is important problems to increase the detection rates and reduce false positive rates in Intrusion Detection System (IDS). Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of …
- 238000001514 detection method 0 title abstract description 48
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2408—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using ferromagnetic tags
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ravipati et al. | Intrusion detection system classification using different machine learning algorithms on KDD-99 and NSL-KDD datasets-a review paper | |
| Thakkar et al. | A survey on intrusion detection system: feature selection, model, performance measures, application perspective, challenges, and future research directions | |
| Gogoi et al. | A survey of outlier detection methods in network anomaly identification | |
| Sharma et al. | An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification | |
| Weller-Fahy et al. | A survey of distance and similarity measures used within network intrusion anomaly detection | |
| Olusola et al. | Analysis of KDD’99 intrusion detection dataset for selection of relevance features | |
| Chauhan et al. | A comparative study of classification techniques for intrusion detection | |
| Ibrahimi et al. | Management of intrusion detection systems based-KDD99: Analysis with LDA and PCA | |
| Gudadhe et al. | A new data mining based network intrusion detection model | |
| Madbouly et al. | Relevant feature selection model using data mining for intrusion detection system | |
| Gupta | An effective model for anomaly IDS to improve the efficiency | |
| Chimphlee et al. | Unsupervised clustering methods for identifying rare events in anomaly detection | |
| Alagrash et al. | Comparing the area of data mining algorithms in network intrusion detection | |
| Neethu | Adaptive intrusion detection using machine learning | |
| Chaudhari et al. | Intrusion detection system: classification, techniques and datasets to implement | |
| Panda et al. | SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM. | |
| Asaju et al. | Intrusion detection system on a computer network using an ensemble of randomizable filtered classifier, K-nearest neighbor algorithm | |
| Riad et al. | Visualize network anomaly detection by using k-means clustering algorithm | |
| Somwang et al. | Computer network security based on support vector machine approach | |
| Bahrololum et al. | An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network. | |
| Chimphlee et al. | Integrating genetic algorithms and fuzzy C-means for anomaly detection | |
| Jayasimhan et al. | Anomaly detection using a clustering technique | |
| Alsulami | A review on machine learning based approaches of network intrusion detection systems | |
| Nachan et al. | Intrusion Detection System: A Survey | |
| He et al. | Detecting anomalous network traffic with combined fuzzy-based approaches |