Data preprocessing for anomaly based network intrusion detection: A review
JJ Davis, AJ Clark - computers & security, 2011 - Elsevier
Data preprocessing is widely recognized as an important stage in anomaly detection. This
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
paper reviews the data preprocessing techniques used by anomaly-based network intrusion …
HEDGE: efficient traffic classification of encrypted and compressed packets
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …
[PDF][PDF] Big data analytics for network intrusion detection: A survey
L Wang, R Jones - International Journal of Networks and …, 2017 - academia.edu
Analysing network flows, logs, and system events has been used for intrusion detection.
Network flows, logs, and system events, etc. generate big data. Big Data analytics can …
Network flows, logs, and system events, etc. generate big data. Big Data analytics can …
Methods, systems, and computer readable media for rapid filtering of opaque data traffic
Methods, systems, and computer readable media for rapid filtering of opaque data traffic are
disclosed. According to one method, the method includes receiving a packet containing a …
disclosed. According to one method, the method includes receiving a packet containing a …
Sceadan: Using concatenated n-gram vectors for improved file and data type classification
NL Beebe, LA Maddox, L Liu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Over 20 studies have been published in the past decade involving file and data type
classification for digital forensics and information security applications. Methods using n …
classification for digital forensics and information security applications. Methods using n …
[HTML][HTML] A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
File type identification (FTI) has become a major discipline for anti-virus developers, firewall
designers and for forensic cybercrime investigators. Over the past few years, research has …
designers and for forensic cybercrime investigators. Over the past few years, research has …
Intrusion detection using MDL compression
This application is a continuation of US patent applica tion Ser. No. 12/260,627, filed Oct. 29,
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …
2008, the entire dis closure of which is hereby incorporated by reference. Embodiments of …
A new approach to content-based file type detection
MC Amirani, M Toorani… - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
File type identification and file type clustering may be difficult tasks that have an increasingly
importance in the field of computer and network security. Classical methods of file type …
importance in the field of computer and network security. Classical methods of file type …
Cyber intrusion prediction and taxonomy system using deep learning and distributed big data processing
H Al Najada, I Mahgoub… - 2018 IEEE symposium …, 2018 - ieeexplore.ieee.org
The issue of cybersecurity is becoming more and more serious every day at all levels and in
all domains. Cyber-attacks threaten the national security of every country and nation …
all domains. Cyber-attacks threaten the national security of every country and nation …
Feature‐based type identification of file fragments
MC Amirani, M Toorani… - Security and …, 2013 - Wiley Online Library
Digital information is packed into files when it is going to be stored on storage media. Each
computer file is associated with a type. Type detection of computer data is a building block in …
computer file is associated with a type. Type detection of computer data is a building block in …