Enhancing false alarm reduction using voted ensemble selection in intrusion detection

Y Meng, LF Kwok - International Journal of Computational Intelligence …, 2013 - Springer
Network intrusion detection systems (NIDSs) have become an indispensable component for
the current network security infrastructure. However, a large number of alarms especially …

Multistage attack detection system for network administrators using data mining

R Katipally, W Gasior, X Cui, L Yang - … of the Sixth Annual Workshop on …, 2010 - dl.acm.org
In this paper, we present a method to discover, visualize, and predict behavior pattern of
attackers in a network based system. We proposed a system that is able to discover …

Optimal allocation of the active filters based on the TABU algorithm in distribution network

W Yan-Song, S Hua, L Xue-min, L Jun… - … on Electrical and …, 2010 - ieeexplore.ieee.org
It is an effective measure to reduce voltage distortion and guarantee power quality by
allocating active filters in distribute network. The location and parameter of active filters are …

Alerts analysis and visualization in network-based intrusion detection systems

L Yang, W Gasior, R Katipally… - 2010 IEEE Second …, 2010 - ieeexplore.ieee.org
The alerts produced by network-based intrusion detection systems, eg Snort, can be difficult
for network administrators to efficiently review and respond to due to the enormous number …

[PDF][PDF] Novel DoS/DDoS attack detection and signature generation

V Katkar, SG Bhirud - International Journal of Computer Applications, 2012 - Citeseer
ABSTRACT Denial of Service (DoS) and Distributed DoS (DDoS) attacks are evolving
continuously. These attacks make network resources unavailable for legitimate users which …

A case study: Intelligent false alarm reduction using fuzzy if-then rules in network intrusion detection

Y Meng, L Kwok - 2012 9th International Conference on Fuzzy …, 2012 - ieeexplore.ieee.org
Nowadays, network intrusion detection systems (NIDSs) have become an essential part for
the network security infrastructure. However, the large number of false alarms is a big …

Framework of intrusion detection system via snort application on campus network environment

MN Ismail, MT Ismail - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
In this research, we propose anarchitectural solution to implement the IntrusionDetection
System (IDS) via snort in campusnetwork environment. Intrusion Detection System (IDS) via …

Shape representation from image sequences by using binary statistical morphology

CS Regazzoni, G Foresti… - Proceedings of 1st …, 1994 - ieeexplore.ieee.org
A real-time visual surveillance system is based on three main image processing phases,
devoted to extract information about the observed scene: change detection, focus of …

Visual mining intrusion behaviors by using swarm technology

X Cui, J Beaver, T Potok, L Yang - 2011 44th Hawaii …, 2011 - ieeexplore.ieee.org
The alerts produced by the real time intrusion detection systems, eg Snort, can be difficult for
security administrators to efficiently review and respond to, due to the enormous amount of …

Automatic signature generation for network services through selective extraction of anomalous contents

PG García-Teodoro… - 2010 Sixth …, 2010 - ieeexplore.ieee.org
In this paper, a novel methodology for automatic signature generation is proposed. It is
based on modelling the normal behaviour of a given network service, and identifying the …