• Aucun résultat trouvé

[PDF] Top 20 Correlation in an intrusion detection process

Has 10000 "Correlation in an intrusion detection process" found on our website. Below are the top 20 most common "Correlation in an intrusion detection process".

Correlation in an intrusion detection process

Correlation in an intrusion detection process

... Attack and alert correlation Our approach for intrusion scenario detection uses the same materials as the ones introduced in section 3, namely attack specification through pre and post c[r] ... Voir le document complet

21

Intrusion detection in network systems through hybrid supervised and unsupervised mining process
- a detailed case study on the ISCX benchmark dataset -

Intrusion detection in network systems through hybrid supervised and unsupervised mining process - a detailed case study on the ISCX benchmark dataset -

... algorithms in the field of data mining, but the training task is time-consuming (computationally expensive) for intrusion detection systems which limits its ...SVM in general treats every ... Voir le document complet

16

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

... integrated in daily life: homes, factories, or public ...intrusions in smart spaces such as smarthomes, or smartfactories, that is based on the monitoring and profiling of radio communications at the ... Voir le document complet

9

Towards privacy preserving cooperative cloud based intrusion detection systems

Towards privacy preserving cooperative cloud based intrusion detection systems

... of intrusion detection were designed and developed to address this issue while maintaining data ...learn an accurate neural-network model for an objective without sharing their input ...used ... Voir le document complet

88

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... handling intrusion detection alarms more ...machine in the ...form an adaptive architecture, which grows in size and depth during its training process, thus to unfold the ... Voir le document complet

7

Investigating Shakeoff Process in Precise Correlation Measurements in Nuclear β Decay

Investigating Shakeoff Process in Precise Correlation Measurements in Nuclear β Decay

... mm. In the detection setup, a telescope and a micro-channel plate position sensitive de- tector (MCPPSD) detect the  particles and the recoil ions ...located in front of the telescope at the ... Voir le document complet

7

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

... average detection rates across the user population (on the y-axis), while we sweep through the entire range of possible attack sizes (on the ...advantage in detecting these attacks (over the homogenous ... Voir le document complet

10

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... plays an important role in the performance of a ...(M.I.) an IF-TDF are two methods used in the process of features ...used in [18] ...a intrusion detection system ... Voir le document complet

5

An Unsupervised Clustering Algorithm for Intrusion Detection

An Unsupervised Clustering Algorithm for Intrusion Detection

... L’accès à ce site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE WEB. Advances in Artificial Intelligence, ... Voir le document complet

4

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... effects. An arrow A → B denotes that problems in A cause issues in ...other in terms of security, and a breach at one place has a knock-on effect on other ...components. In terms of ... Voir le document complet

177

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

... increase in such a way that makes current Cloud Providers resources become ...provides an effective platform for that by enabling CPs to upgrade their resource scaling ...results in performance ... Voir le document complet

191

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... operate in hostile unattended environments, it is imperative to address these security concerns from the beginning of the system ...security in sensor networks poses different challenges than traditional ... Voir le document complet

73

Event Correlation Analytics: Scaling Process Mining Using Mapreduce-Aware Event Correlation Discovery Techniques

Event Correlation Analytics: Scaling Process Mining Using Mapreduce-Aware Event Correlation Discovery Techniques

... implementing an addi- tional secondary sorting within the reducer, we used the value-to-key conversion design pattern [12], which is known to provide a scalable solution for secondary ...sorting. In ... Voir le document complet

16

Recent Trends in Statistical Analysis of Event Logs for Network-Wide Intrusion Detection

Recent Trends in Statistical Analysis of Event Logs for Network-Wide Intrusion Detection

... anomaly detection algorithms to event ...vectors in Euclidean spaces [7], discrete sequences [8], graphs [2]), none of these perfectly fits the complex nature of the input consid- ered ...here. An ... Voir le document complet

9

A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments

A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments

... IDS in a multi-cloud ...enables an IDS to evaluate the trust value of other IDSs using bayesian ...coalition in such a way that enhances their ability to work with trusted ...has an incentive ... Voir le document complet

9

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... the intrusion de- tection features giving the ability to share a common conceptual understanding threats and design the signature rules [1, 7, 10, 13, ...20]. In fact, the use of the ontologies and OWL ... Voir le document complet

13

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... used in some applications, in particular in the IDS context, [24], [25] and has been recently extended in [26], [27], [28], [29] or [30] to improve the selection of attributes and their split ... Voir le document complet

17

An evidential reasoning approach to evaluate intrusion vulnerability in distribution networks

An evidential reasoning approach to evaluate intrusion vulnerability in distribution networks

... comprises an array of heuristic techniques such as fuzzy logic, evidential reasoning, neural networks, and genetic algorithms, which essentially provide rational solutions for complex real-world problems ... Voir le document complet

8

Fatigue microcrack detection with digital image correlation

Fatigue microcrack detection with digital image correlation

... consists in probing the initial (single iteration) gain for a candidate ...is an original algorithm that has never been proposed and hence the following sections provide details on this sensitivity ... Voir le document complet

58

Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters

Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters

... past, an emerging area for mitigating cache- based SCAs is detection around malicious ...patches in operating ...These detection based techniques focussed on detection by incoming ... Voir le document complet

3

Show all 10000 documents...