Proceedings of the 2001 SIAM International Conference on Data Mining 2001
DOI: 10.1137/1.9781611972719.28
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Novel Network Intrusions Using Bayes Estimators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
137
0
6

Year Published

2004
2004
2014
2014

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 228 publications
(143 citation statements)
references
References 9 publications
0
137
0
6
Order By: Relevance
“…As a result, vector H is inherently sorted in ascending order of values because the AutomatedCluster-Threshold-Discovery procedure traverses vector C0 in a linear fashion. With these concepts in mind, let us define the column vector Y'=(y 1 , y 2 , . . .…”
Section: The Proposed Unpcc Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, vector H is inherently sorted in ascending order of values because the AutomatedCluster-Threshold-Discovery procedure traverses vector C0 in a linear fashion. With these concepts in mind, let us define the column vector Y'=(y 1 , y 2 , . . .…”
Section: The Proposed Unpcc Algorithmmentioning
confidence: 99%
“…Unsupervised classification is particularly useful in detecting previously unobserved attacks in network intrusion detection domain since new attacks on computers and networks can occur any time. Furthermore, unsupervised classification algorithms are usually employed after a failure of a misuse detection classifier [1] to identify an instance as belonging to a known attack type, in order to uncover new types of intrusions. At the same time, a robust unsupervised classification algorithm could possibly eliminate the need for a human analyst in the assignment of labels to unknown attack types by fully automating the labeling process.…”
Section: Introductionmentioning
confidence: 99%
“…However, it is a little more challenging to relieve the network administrator of the task of keeping the signatures updated by monitoring the traffic to determine normal usage patterns. Systems such as ADAM [10], NIDES [11], SPADE [12], and Emerald [13] do just that. These mentioned IDS systems use an expert system database consisting of intrusive signature, encoded with knowledge gleaned from security experts to test files or network traffic for patterns known to occur in attacks.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The basic assumption of anomaly detection using supervised algorithms is that anomalous traffic is statistically different from normal traffic. Many studies have applied several algorithms based upon this assumption, such as the Bayesian network [16], k-nearest neighbor [17], and support vector machine algorithm [18]. Nevertheless, the performance of these algorithms has not been compared.…”
Section: Introductionmentioning
confidence: 99%