Data Mining for Network Intrusion Detection: A Comparison of Alternative Methods
Intrusion detection systems help network administrators prepare for and deal with network security attacks. These systems collect information from a variety of systems and network sources, and analyze them for signs of intrusion and misuse. A variety of techniques have been employed for analysis ran...
Saved in:
Main Authors: | ZHU, Dan, Premkumar, G., ZHANG, Xiaoning, CHU, Chao-Hsien |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1764 http://onlinelibrary.wiley.com/doi/10.1111/j.1540-5915.2001.tb00975.x/abstract |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
A behavior-based intrusion prevention system
by: Bundang, M. A., et al.
Published: (2008) -
Automated signature creator for a signature based intrusion detection system (Pancakes)
by: De Ocampo, Frances Bernadette C., et al.
Published: (2013) -
Automated signature creator for a signature based intrusion detection system (Pancakes)
by: De Ocampo, Frances Bernadette C., et al.
Published: (2013) -
An Intrusion Response Decision-Making Model Based on Hierarchical Task Network Planning
by: MU, Chengpo, et al.
Published: (2010) -
A case study on attack detection capabilities between open-source intrusion detection systems
by: Ascan, Adrian Giovanni G.
Published: (2022)