• Aucun résultat trouvé

[PDF] Top 20 Distance Measures for Anomaly Intrusion Detection

Has 10000 "Distance Measures for Anomaly Intrusion Detection" found on our website. Below are the top 20 most common "Distance Measures for Anomaly Intrusion Detection".

Distance Measures for Anomaly Intrusion Detection

Distance Measures for Anomaly Intrusion Detection

... data. For example, it took Hidden Markov Models (HMM) approximately two months to train an anomaly detection model with a large data set ...adequate for real-time intrusion ...hand, ... Voir le document complet

10

Online One-class Classification for Intrusion Detection Based on the Mahalanobis Distance

Online One-class Classification for Intrusion Detection Based on the Mahalanobis Distance

... criterion for online intrusion detection algorithms is the time for testing new ...second for each new sample, which is faster than the quarter-sphere SVM with ...criterion for ... Voir le document complet

7

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... of anomaly detection, reconstruction error is the criterion used to decide whether a data item is normal or deviates too much from ...unsupervised anomaly detector based on an ensemble of ... Voir le document complet

17

Probabilistic Anomaly Detection Method for Authorship Verification

Probabilistic Anomaly Detection Method for Authorship Verification

... one for the normal- ized frequencies of occurrence of the top 30 function words in the corpus, and an- other for the normalized frequencies of occurrence of ...Then, for each author, we used 75% of ... Voir le document complet

10

Geometric Inference for Measures based on Distance Functions

Geometric Inference for Measures based on Distance Functions

... requirement for many geometry processing and data analysis algorithms. The need for robust estimation of geometric invariants have been recognized long time ago in geometry processing, and such invariants ... Voir le document complet

29

Anomaly detection through explanations

Anomaly detection through explanations

... analysis detection [94, 34] and isolation forests [141, ...proposed for high-dimensional data [260], where there are so many dimensions of the data, that it may be unscalable to cluster (or group) similar ... Voir le document complet

230

Sequence Covering for Efficient Host-Based Intrusion Detection

Sequence Covering for Efficient Host-Based Intrusion Detection

... elastic measures such as the Levenshtein’s ...allows for subsequences to be swapped, an operation that is very costly to imple- ment in the editing distance ...as for the Levenshtein’s ... Voir le document complet

15

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... proposed intrusion detection approaches based on ...an anomaly-based intrusion detection model based on Hidden Markov Models ...used for anomaly detection ... Voir le document complet

181

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... Intrusion detection systems (IDS) are meant to fill the gap between the ex- pected and the real security ...tool for administrators to check that other security measures are operating as ...of ... Voir le document complet

177

Hybrid Isolation Forest - Application to Intrusion Detection

Hybrid Isolation Forest - Application to Intrusion Detection

... in anomaly detection, we consider here the one-class Support Vector Machine (1C-SVM), and the supervised two-classes Support Vector Machine (2C-SVM) as two ...selected for the 1C-SVM and the 2C-SVM ... Voir le document complet

25

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... (Network Intrusion Detection system) is an effective approach for dealing with these security ...Their detection engines use two main approaches to inspect malicious traffic; misuse ... Voir le document complet

5

Large-scale nonlinear dimensionality reduction for network intrusion detection

Large-scale nonlinear dimensionality reduction for network intrusion detection

... (legend) for all methods. Best emdeddings of KDD99 with t-SNE. For visualization purposes, and since t-SNE outperforms other methods, Figure 2 shows 2D embeddings after running t-SNE with the Euclidean ... Voir le document complet

7

Augmenting anomaly detection for autonomous vehicles with symbolic rules

Augmenting anomaly detection for autonomous vehicles with symbolic rules

... It is common to use training data based models within self-driving solutions. Machine learning techniques lend themselves to identify and classify scenes and actions similar to ones they have already seen. Perception ... Voir le document complet

54

Real-time anomaly detection with in-flight data : streaming anomaly detection with heterogeneous communicating agents

Real-time anomaly detection with in-flight data : streaming anomaly detection with heterogeneous communicating agents

... success for use cases such as spam filtering [ Georgala et ...network intrusion detection [ Li and Guo, 2007 ...available for Active Learning and a survey summarizing them can be found in [ ... Voir le document complet

112

Anomaly Detection Based on Aggregation of Indicators

Anomaly Detection Based on Aggregation of Indicators

... Anomaly Detection be robust and to provide state-of-the-art classification ...importance measures that can be used to identify the most important ...appropriate for high dimensional ... Voir le document complet

9

f-Divergence Measures for Evaluation in  Community Detection

f-Divergence Measures for Evaluation in Community Detection

... D joint = 2Dsum is known as variation of information (VI) introduced by Meila [11], it satisfies the properties of metrics but not the one of normalization. In [3] it was proved that Dmax is a metric, while Dmin and ... Voir le document complet

9

f-Divergence Measures for Evaluation in  Community Detection

f-Divergence Measures for Evaluation in Community Detection

... D joint = 2D sum is known as variation of information (VI) introduced by Meila [11], it satisfies the properties of metrics but not the one of normalization. In [3] it was proved that D max is a metric, while D min and ... Voir le document complet

10

EXAD: A System for Explainable Anomaly Detection on Big Data Traces

EXAD: A System for Explainable Anomaly Detection on Big Data Traces

... series. For example, in [13], the authors applied semi-supervised anomaly detection ...The anomaly detection is based on a pre-determined ...Euclidean distance between ground ... Voir le document complet

7

An Unsupervised Clustering Algorithm for Intrusion Detection

An Unsupervised Clustering Algorithm for Intrusion Detection

... The amount of normal log data is usually overwhelmingly larger than that of intrusion data. Normal data are usually distinguished from the intrusions based on the Euclidean distance. Therefore, the normal ... Voir le document complet

4

Performance analysis of wireless intrusion detection systems

Performance analysis of wireless intrusion detection systems

... the intrusion in early stage before the infection ...parameter measures the deviation of the intermediate point from the objective ...criterion for evaluating the point rank, but also the attack ... Voir le document complet

169

Show all 10000 documents...