IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Advances in knowledge discovery and data mining
Advances in knowledge discovery and data mining
Data mining: practical machine learning tools and techniques with Java implementations
Data mining: practical machine learning tools and techniques with Java implementations
Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Integrating Data Mining Techniques with Intrusion Detection Methods
Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security
NetSTAT: A Network-Based Intrusion Detection Approach
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
The role of suspicion in model-based intrusion detection
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
An internet routing forensics framework for discovering rules of abnormal BGP events
ACM SIGCOMM Computer Communication Review
Summarization — Compressing Data into an Informative Representation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Challenging the anomaly detection paradigm: a provocative discussion
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Summarization – compressing data into an informative representation
Knowledge and Information Systems
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Network Anomalous Attack Detection Based on Clustering and Classifier
Computational Intelligence and Security
WIDS: a sensor-based online mining wireless intrusion detection system
IDEAS '08 Proceedings of the 2008 international symposium on Database engineering & applications
ACM Computing Surveys (CSUR)
Fast likelihood search for hidden Markov models
ACM Transactions on Knowledge Discovery from Data (TKDD)
Evolutionary flexible neural networks for intrusion detection system
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
Clustering and classification based anomaly detection
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Weighted intra-transactional rule mining for database intrusion detection
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
SCIDS: a soft computing intrusion detection system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Intrusion detection using text mining in a web-based telemedicine system
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Using data field to analyze network intrusions
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Learning the daily model of network traffic
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
MEPIDS: multi-expression programming for intrusion detection system
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
Feature selection and intrusion detection using hybrid flexible neural tree
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Hybrid intrusion detection model based on ordered sequences
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
ICAISC'06 Proceedings of the 8th international conference on Artificial Intelligence and Soft Computing
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Goals and Practices in Maintaining Information Systems Security
International Journal of Information Security and Privacy
Hi-index | 0.01 |
Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM (Audit Data Analysis and Mining) system, which we use as a testbed to study how useful data mining techniques can be in intrusion detection.