Movatterモバイル変換


[0]ホーム

URL:


Lee et al., 2001 - Google Patents

Real time data mining-based intrusion detection

Lee et al., 2001

ViewPDF
Document ID
13680005334635286608
Author
Lee W
Stolfo S
Chan P
Eskin E
Fan W
Miller M
Hershkop S
Zhang J
Publication year
Publication venue
Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01

External Links

Snippet

We present an overview of our research in real time data mining-based intrusion detection systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real time environment. We describe our approaches to address three types of issues: accuracy …
Continue reading atapps.dtic.mil (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes

Similar Documents

PublicationPublication DateTitle
Lee et al.Real time data mining-based intrusion detection
Cai et al.Structural temporal graph neural networks for anomaly detection in dynamic graphs
Dokas et al.Data mining for network intrusion detection
Nguyen et al.Design and implementation of intrusion detection system using convolutional neural network for DoS detection
Eskin et al.Adaptive model generation for intrusion detection systems
Mukkamala et al.Detecting denial of service attacks using support vector machines
Devi et al.A Review Paper on IDS in Edge Computing or EoT
Abraham et al.Soft computing models for network intrusion detection systems
Lappas et al.Data mining techniques for (network) intrusion detection systems
AlserhaniAlert correlation and aggregation techniques for reduction of security alerts and detection of multistage attack
Al-Subaie et al.Efficacy of hidden Markov models over neural networks in anomaly intrusion detection
Novikov et al.Artificial intelligence approaches for intrusion detection
Li et al.Grid‐and dummy‐cluster‐based learning of normal and intrusive clusters for computer intrusion detection
Lagzian et al.Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios
Michailidis et al.Intrusion detection using evolutionary neural networks
Rawat et al.A fast host-based intrusion detection system using rough set theory
AlserhaniA framework for multi-stage attack detection
Shin et al.Applying data mining techniques to analyze alert data
Wenke Lee et al.Real Time Data Mining-based Intrusion Detection zyxwvutsrqponm
Eskin et al.Real Time Data Mining-based Intrusion Detection
Wang et al.Measuring false-positive by automated real-time correlated hacking behavior analysis
Wang et al.Network intrusion detection with workflow feature definition using bp neural network
Shin et al.An alert data mining framework for network-based intrusion detection system
Raut et al.Intrusion detection system using data mining approach
Li et al.Mining normal and intrusive activity patterns for computer intrusion detection

[8]
ページ先頭

©2009-2025 Movatter.jp