• No results found

program-based anomaly detection

A Survey on Botnet Detection Based On Anomaly and Community Detection

A Survey on Botnet Detection Based On Anomaly and Community Detection

... A Botmaster employs Bots to collect secret information from victim hosts by using techniques such key logging, reading log files and screen capture. For example, the SDBot is a type of Botnet which employs a key logging ...

7

Anomaly detection of web-based attacks

Anomaly detection of web-based attacks

... We used eleven real-world exploits downloaded from popu- lar security sites [6, 27, 29] for our experiment. The set of at- tacks consisted of a buffer overflow against phorum [26], a php message board, and three ...

11

Botnet Detection based on System and Community Anomaly Detection

Botnet Detection based on System and Community Anomaly Detection

... Earlier in client- server computing, each application had its own client program and it worked as a user interface and need to be installed on each user’s personal computer. Most web applications use HTML/XHTML ...

5

The Application of Intrusion Detection Systems in a Forensic Environment. (Extended Abstract)

The Application of Intrusion Detection Systems in a Forensic Environment. (Extended Abstract)

... intrusion detection and forensics as well as the roles that both disciplines play in the overall network security picture, has been done by Stephenson in the form of the Intrusion Management Model ...

6

Hyperspectral Imagery Target Detection Using Improved Anomaly Detection and Signature Matching Methods

Hyperspectral Imagery Target Detection Using Improved Anomaly Detection and Signature Matching Methods

... conclude, based on visual inspection, that the ORASIS detector is effective in detecting anomalies, though no comparisons are made to other detection ...

390

Threats of Botnet to Internet Security and Respective Defense Strategies

Threats of Botnet to Internet Security and Respective Defense Strategies

... Abstract— Botnets are one of the most dangerous threats to internet security. The problem of Botnet is global in nature. A botnet is a network of computers infected with a malicious program that allows ...

7

1414 0 iids pdf

1414 0 iids pdf

... short of the DARPA goals for detection and false-alarm performance. The Air Force Rome Lab has built a real- time test bed [29] based on the system used by Lincoln to generate its offline evaluation data. ...

22

A SURVEY ON CLOUD BASED INTRUSION DETECTION SYSTEM USING ARTIFICIAL NEURAL NETWORKS AND FUZZY CLUSTERING

A SURVEY ON CLOUD BASED INTRUSION DETECTION SYSTEM USING ARTIFICIAL NEURAL NETWORKS AND FUZZY CLUSTERING

... Intrusion Detection Systems ...intrusion detection process and detects possible ...activity based on limited, incomplete, and nonlinear data ...intrusion detection systems (IDS) when compared ...

10

Rank Based Anomaly Detection Algorithms

Rank Based Anomaly Detection Algorithms

... outlier detection problems are of considerable importance, arising frequently in diverse real-world applications such as finance and ...of anomaly detection in financial institution (see ...

182

A Survey on Different Advanced Database Security Policies against Masquerade Attacks

A Survey on Different Advanced Database Security Policies against Masquerade Attacks

... decision based on the result of the comparison made in the above phase, and will decide whether to allow the query for being processed or to alert the system if any of the intrusion ...

7

A General Study of Associations rule mining in Intrusion Detection System

A General Study of Associations rule mining in Intrusion Detection System

... information detection cannot effectively deal with changes in network behavior, it will better meet the actual needs of abnormal detection to introduce the concept of fuzzy association rules to strengthen ...

10

A hybrid unsupervised clustering-based anomaly detection method

A hybrid unsupervised clustering-based anomaly detection method

... Moreover, Amoli et al. [15] proposed an unsupervised IDS for high-speed networks, which detected zero- day attacks via two separate engines. The first engine used the DBSCAN clustering to detect attacks and the second ...

10

Network Anomaly Detection Based on Wavelet Analysis

Network Anomaly Detection Based on Wavelet Analysis

... Some anomaly detection system prototypes based on wavelet analysis techniques have also been developed and implemented recently, such as Waveman by Huang et ...intrusion detection dataset and ...

16

Interactive Assistance for Anomaly-Based Intrusion Detection

Interactive Assistance for Anomaly-Based Intrusion Detection

... It is natural for a human analyst to attempt to determine the type of a device, or the role of a network host first as they try to determine if there is an anomaly and before they look further into the actual ...

181

IDBSCAN Algorithm Based Proficient Anomaly Detection

IDBSCAN Algorithm Based Proficient Anomaly Detection

... widespread anomaly detection framework named Holmes for regular activities in ...outlier detection system on the basis of ...cluster. Based on the above factor the normal and abnormal point ...

8

Vision Based Anomaly Detection System for ATM

Vision Based Anomaly Detection System for ATM

... Lars Moland Eliassen, et. all, [5] proposed a calculation yields predominant exactness and vigor when utilized as a part of a stance estimation setting. General purpose computing on graphics processing units (GPGPU) that ...

6

Anomaly-based Techniques for Web Attacks Detection

Anomaly-based Techniques for Web Attacks Detection

... anomalies detection approach in this work, only one level of the 2DWT is performed, since the significant abrupt changes are associ- ated to high frequencies wavelet ...

10

Review on Anomaly Based Intrusion Detection System

Review on Anomaly Based Intrusion Detection System

... only based on regular expressions and string matching. Signature based detection does not work well with techniques like nop generators, payload ...signature based systems is very much ...

10

Multivariate Correlation Analysis for Detection of Denial Of Service Attack

Multivariate Correlation Analysis for Detection of Denial Of Service Attack

... attack detection method employs the principle of anomaly based detection technique in attack ...this detection system is evaluated using KDD Cup 99 data set, and the influences of both ...

6

3D Gabor Based Hyperspectral Anomaly Detection

3D Gabor Based Hyperspectral Anomaly Detection

... target detection. In a target detection problem, the aim is to recognize a specific target from the image ...target detection problems are divided into two main ...target detection is also ...

6

Show all 10000 documents...

Related subjects