Classification de flux applicatifs et détection d'intrusion dans le trafic Internet
Texte intégral
Documents relatifs
In this paper, we compare the results achieved on public graph databases for the classification of symbols and letters using this graph signature with those obtained using the
Mycelium mostly absent or poorly developed; hyphae, when present, septate, with septa having numerous pores rather than a single septal pore; vegetative cells proliferating by
Many applications algorithms and models have been proposed to estimate this conditional probability density function : kernel-density estimator [32], k- nearest-neighbours (KNN)
The most effi- cient classification methods are explained: cosine similarity method, naïve Bayesian classifier and artificial neural network.. This research explores
In Section 3 we apply the oracle inequality to two types of classifiers one of which is constructed by minimization on sieves (as in Tsy- bakov (2004)), and gives an adaptive
NADA a été défini comme un algorithme multi-échelles (il n’existe pas une échelle de temps unique qui permette de détecter toutes les anomalies – chacune agit avec ses
Such estima- tions allow to rely on a single bandwidth value, and we show that it provides good results on classification tasks when extending the naive Bayesian classifier
Second, the diversity of information provided by each data time series used during the monitoring and analysis process improves the correctness of detection,