Network intrusion detection in covariance feature space
Pattern Recognition
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Automatic Adaptation and Analysis of SIP Headers Using Decision Trees
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Minimizing False Positives of a Decision Tree Classifier for Intrusion Detection on the Internet
Journal of Network and Systems Management
Distributed event-based access control
International Journal of Information and Computer Security
Dynamic event-based access control as term rewriting
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Expert Systems with Applications: An International Journal
Journal of Network and Computer Applications
ACE-Cost: acquisition cost efficient classifier by hybrid decision tree with local SVM leaves
MLDM'11 Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition
Using decision trees for generating adaptive SPIT signatures
Proceedings of the 4th international conference on Security of information and networks
Term rewriting for access control
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Spam behavior recognition based on session layer data mining
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
HTTP botnet detection using adaptive learning rate multilayer feed-forward neural network
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
Hi-index | 0.00 |
Network based intrusion detection are the most deployedIDS. They frequently rely on signature matching detectionmethod and focus on the security of low level network protocols.Because of the large number of false positives fromone side, and the incapacity to detect some attack types fromanother side, IDS must allow more interest to the monitoringof application level protocols.We propose in this paper a combination of patternmatching and protocol analysis approaches. While the firstmethod of detection relies on a multipattern matching strategy,the second one benefits from an efficient decision treeadaptative to the network traffic characteristics.