Advances in knowledge discovery and data mining
Advances in knowledge discovery and data mining
Web farming for the data warehouse
Web farming for the data warehouse
Data mining: concepts and techniques
Data mining: concepts and techniques
Difficulties in simulating the internet
IEEE/ACM Transactions on Networking (TON)
Systems for Knowledge Discovery in Databases
IEEE Transactions on Knowledge and Data Engineering
Learning Temporal Regularities of User Behavior for Anomaly Detection
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Security as Services in Active Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Statistical Data Mining and Knowledge Discovery
Statistical Data Mining and Knowledge Discovery
Web Mining: Information and Pattern Discovery on the World Wide Web
ICTAI '97 Proceedings of the 9th International Conference on Tools with Artificial Intelligence
A machine learning approach to detecting attacks by identifying anomalies in network traffic
A machine learning approach to detecting attacks by identifying anomalies in network traffic
Internet Security: Intrusion Detection and Prevention: Minitrack Introduction
HICSS '04 Proceedings of the Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7 - Volume 7
MAIDS: mining alarming incidents from data streams
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
A Flexible Mining Architecture for Providing New E-Knowledge Services
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 3 - Volume 03
An Adaptable Security Framework for Service-based Systems
WORDS '05 Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Hi-index | 0.00 |
Today, security is of strategic importance for many computer science applications. Unfortunately, an optimal solution does not exist and often system administrators are faced with new security problems when trying to protect computing resources within a reasonable time. Security applications that seem effective at first, could actually be unsuitable. This paper introduces a way of developing flexible computer security solutions which can allow system administrators to intervene rapidly on systems by adapting not only existing solutions but new ones as well. To this end, the study suggests considering the problem of intrusion detection as a Knowledge Discovery process and to describe it in terms of both e-services and miner building blocks. In addition, a definition of an intrusion detection process using Web content analysis generated by users is presented.