Joint coding and embedding techniques for multimedia images
Information Sciences: an International Journal
Non-stationary Data Mining: The Network Security Issue
ICANN '08 Proceedings of the 18th international conference on Artificial Neural Networks, Part II
IDS Based on Bio-inspired Models
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Search-order coding method with indicator-elimination property
Journal of Systems and Software
Reversible Data Hiding in the VQ-Compressed Domain
IEICE - Transactions on Information and Systems
Fast codebook search algorithm for vector quantization using sorting technique
Proceedings of the International Conference on Advances in Computing, Communication and Control
Application of Kekre's fast code book generation algorithm for face recognition
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Iris recognition using discrete cosine transform and Kekre's fast codebook generation algorithm
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Coloring gray scale digital images using Kekre's fast code book generation algorithm
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Kekre's Fast Codebook Generation algorithm for tumor detection in mammography images
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Intrusion detection at packet level by unsupervised architectures
IDEAL'07 Proceedings of the 8th international conference on Intelligent data engineering and automated learning
Image and Vision Computing
Vector quantization using global codebook technique
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
A fast VQ codebook search with initialization and search order
Information Sciences: an International Journal
Adaptive method for monitoring network and early detection of internet worms
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
Hi-index | 0.00 |
Machine learning and data mining algorithms are increasingly being used in the intrusion detection systems (IDS), but their performances are laggard to some extent especially applied in network based intrusion detection: the larger load of network traffic monitoring requires more efficient algorithm in practice. In this paper, we propose and design an anomaly intrusion detection (AID) system based on the vector quantization (VQ) which is widely used for data compression and high-dimension multimedia data index. The design procedure optimizes the performance of intrusion detection by jointly accounting for accurate usage profile modeling by the VQ codebook and fast similarity measures between feature vectors to reduce the computational cost. The former is just the key of getting high detection rate and the later is the footstone of guaranteeing efficiency and real-time style of intrusion detection. Experiment comparisons to other related researches show that the performance of intrusion detection is improved greatly.