Academic literature on the topic 'Unsupervised intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Unsupervised intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Unsupervised intrusion detection"
ZHONG, SHI, TAGHI M. KHOSHGOFTAAR, and NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION." International Journal of Reliability, Quality and Safety Engineering 14, no. 02 (April 2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Full textHajamydeen, Asif Iqbal, and Nur Izura Udzir. "A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework." Scalable Computing: Practice and Experience 20, no. 1 (March 9, 2019): 113–60. http://dx.doi.org/10.12694/scpe.v20i1.1465.
Full textZoppi, Tommaso, Mohamad Gharib, Muhammad Atif, and Andrea Bondavalli. "Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems." ACM Transactions on Cyber-Physical Systems 5, no. 4 (October 31, 2021): 1–27. http://dx.doi.org/10.1145/3467470.
Full textMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection." Proceedings 2, no. 18 (September 17, 2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Full textCasas, Pedro, Johan Mazel, and Philippe Owezarski. "Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge." Computer Communications 35, no. 7 (April 2012): 772–83. http://dx.doi.org/10.1016/j.comcom.2012.01.016.
Full textZhao, Yi Lin, and Qing Lei Zhou. "Intrusion Detection Method Based on LEGClust Algorithm." Applied Mechanics and Materials 263-266 (December 2012): 3025–33. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3025.
Full textAlmalawi, Abdulmohsen, Adil Fahad, Zahir Tari, Asif Irshad Khan, Nouf Alzahrani, Sheikh Tahir Bakhsh, Madini O. Alassafi, Abdulrahman Alshdadi, and Sana Qaiyum. "Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data." Electronics 9, no. 6 (June 18, 2020): 1017. http://dx.doi.org/10.3390/electronics9061017.
Full textLi, Longlong, Qin Chen, Shuiming Chi, and Xiaohang Liu. "Unsupervised Intrusion Detection based on FCM and Vote Mechanism." Information Technology Journal 13, no. 1 (December 15, 2013): 133–39. http://dx.doi.org/10.3923/itj.2014.133.139.
Full textIraqi, Omar, and Hanan El Bakkali. "Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention." Security and Communication Networks 2019 (July 28, 2019): 1–13. http://dx.doi.org/10.1155/2019/8368473.
Full textMin, Luo, Zhang Huan-guo, and Wang Li-na. "Research and implementation of unsupervised clustering-based intrusion detection." Wuhan University Journal of Natural Sciences 8, no. 3 (September 2003): 803–7. http://dx.doi.org/10.1007/bf02900819.
Full textDissertations / Theses on the topic "Unsupervised intrusion detection"
Siddiqui, Abdul Jabbar. "Securing Connected and Automated Surveillance Systems Against Network Intrusions and Adversarial Attacks." Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/42345.
Full textSong, Jungsuk. "Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning." 京都大学 (Kyoto University), 2009. http://hdl.handle.net/2433/123840.
Full textDang, Binh Hy. "Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/128.
Full textMathur, Nitin O. "Application of Autoencoder Ensembles in Anomaly and Intrusion Detection using Time-Based Analysis." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161374876195402.
Full textLabonne, Maxime. "Anomaly-based network intrusion detection using machine learning." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS011.
Full textIn recent years, hacking has become an industry unto itself, increasing the number and diversity of cyber attacks. Threats on computer networks range from malware to denial of service attacks, phishing and social engineering. An effective cyber security plan can no longer rely solely on antiviruses and firewalls to counter these threats: it must include several layers of defence. Network-based Intrusion Detection Systems (IDSs) are a complementary means of enhancing security, with the ability to monitor packets from OSI layer 2 (Data link) to layer 7 (Application). Intrusion detection techniques are traditionally divided into two categories: signatured-based (or misuse) detection and anomaly detection. Most IDSs in use today rely on signature-based detection; however, they can only detect known attacks. IDSs using anomaly detection are able to detect unknown attacks, but are unfortunately less accurate, which generates a large number of false alarms. In this context, the creation of precise anomaly-based IDS is of great value in order to be able to identify attacks that are still unknown.In this thesis, machine learning models are studied to create IDSs that can be deployed in real computer networks. Firstly, a three-step optimization method is proposed to improve the quality of detection: 1/ data augmentation to rebalance the dataset, 2/ parameters optimization to improve the model performance and 3/ ensemble learning to combine the results of the best models. Flows detected as attacks can be analyzed to generate signatures to feed signature-based IDS databases. However, this method has the disadvantage of requiring labelled datasets, which are rarely available in real-life situations. Transfer learning is therefore studied in order to train machine learning models on large labeled datasets, then finetune them on benign traffic of the network to be monitored. This method also has flaws since the models learn from already known attacks, and therefore do not actually perform anomaly detection. Thus, a new solution based on unsupervised learning is proposed. It uses network protocol header analysis to model normal traffic behavior. Anomalies detected are then aggregated into attacks or ignored when isolated. Finally, the detection of network congestion is studied. The bandwidth utilization between different links is predicted in order to correct issues before they occur
Tjhai, Gina C. "Anomaly-based correlation of IDS alarms." Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Full textAwodokun, Olugbenga. "Classification of Patterns in Streaming Data Using Clustering Signatures." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504880155623189.
Full textPierrot, David. "Détection dynamique des intrusions dans les systèmes informatiques." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE2077.
Full textThe expansion and democratization of the digital world coupled with the effect of the Internet globalization, has allowed individuals, countries, states and companies to interconnect and interact at incidence levels never previously imagined. Cybercrime, in turn, is unfortunately one the negative aspects of this rapid global interconnection expansion. We often find malicious individuals and/or groups aiming to undermine the integrity of Information Systems for either financial gain or to serve a cause. The consequences of an intrusion can be problematic for the existence of a company or an organization. The impacts are synonymous with financial loss, brand image degradation and lack of seriousness. The detection of an intrusion is not an end in itself, the reduction of the delta detection-reaction has become a priority. The different existing solutions prove to be cumbersome to set up. Research has identified more efficient data mining methods, but integration into an information system remains difficult. Capturing and converting protected resource data does not allow detection within acceptable time frames. Our contribution helps to detect intrusions. Protect us against Firewall events which reduces the need for computing power while limiting the knowledge of the information system by intrusion detectors. We propose an approach taking into account the technical aspects by the use of a hybrid method of data mining but also the functional aspects. The addition of these two aspects is grouped into four phases. The first phase is to visualize and identify network activities. The second phase concerns the detection of abnormal activities using data mining methods on the source of the flow but also on the targeted assets. The third and fourth phases use the results of a risk analysis and a safety verification technique to prioritize the actions to be carried out. All these points give a general vision on the hygiene of the information system but also a direction on monitoring and corrections to be made.The approach developed to a prototype named D113. This prototype, tested on a platform of experimentation in two architectures of different size made it possible to validate our orientations and approaches. The results obtained are positive but perfectible. Prospects have been defined in this direction
Stomeo, Carlo. "Applying Machine Learning to Cyber Security." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.
Full textLu, Wei. "Unsupervised anomaly detection framework for multiple-connection based network intrusions." Thesis, 2005. http://hdl.handle.net/1828/1949.
Full textBook chapters on the topic "Unsupervised intrusion detection"
Singh, Jai Puneet, and Nizar Bouguila. "Intrusion Detection Using Unsupervised Approach." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 192–201. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67837-5_18.
Full textLaskov, Pavel, Patrick Düssel, Christin Schäfer, and Konrad Rieck. "Learning Intrusion Detection: Supervised or Unsupervised?" In Image Analysis and Processing – ICIAP 2005, 50–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11553595_6.
Full textGuan, Yu, Ali A. Ghorbani, and Nabil Belacel. "An Unsupervised Clustering Algorithm for Intrusion Detection." In Advances in Artificial Intelligence, 616–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44886-1_60.
Full textCorona, Igino, Giorgio Giacinto, and Fabio Roli. "Intrusion Detection in Computer Systems Using Multiple Classifier Systems." In Supervised and Unsupervised Ensemble Methods and their Applications, 91–113. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78981-9_5.
Full textMakkar, Garima, Malini Jayaraman, and Sonam Sharma. "Network Intrusion Detection in an Enterprise: Unsupervised Analytical Methodology." In Data Management, Analytics and Innovation, 451–63. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1402-5_34.
Full textPark, Kyung Ho, Eunji Park, and Huy Kang Kim. "Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort." In Information Security Applications, 45–58. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_4.
Full textKaur, Sanmeet, and Ishan Garg. "Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection." In Communications in Computer and Information Science, 228–38. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_23.
Full textMin, Erxue, Jun Long, Qiang Liu, Jianjing Cui, Zhiping Cai, and Junbo Ma. "SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection." In Cloud Computing and Security, 322–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_30.
Full textDahiya, Priyanka, and Devesh Kumar Srivastava. "A Comparative Evolution of Unsupervised Techniques for Effective Network Intrusion Detection in Hadoop." In Communications in Computer and Information Science, 279–87. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1813-9_28.
Full textLuo, Min, Lina Wang, Huanguo Zhang, and Jin Chen. "A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine." In Information and Communications Security, 325–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_30.
Full textConference papers on the topic "Unsupervised intrusion detection"
Zanero, Stefano, and Giuseppe Serazzi. "Unsupervised learning algorithms for intrusion detection." In NOMS 2008 - 2008 IEEE Network Operations and Management Symposium. IEEE, 2008. http://dx.doi.org/10.1109/noms.2008.4575276.
Full textZhang, Jiong, and Mohammad Zulkernine. "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection." In 2006 IEEE International Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/icc.2006.255127.
Full textWang, Zuohua. "Unsupervised intrusion detection algorithm based on association amendment." In 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. http://dx.doi.org/10.1109/fskd.2014.6980960.
Full textZhang, Cuixiao, Guobing Zhang, and Shanshan Sun. "A Mixed Unsupervised Clustering-Based Intrusion Detection Model." In 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.72.
Full textHarbi, Nouria, and Emna Bahri. "Real detection intrusion using supervised and unsupervised learning." In 2013 International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, 2013. http://dx.doi.org/10.1109/socpar.2013.7054151.
Full textAmbusaidi, Mohammed A., Xiangjian He, and Priyadarsi Nanda. "Unsupervised Feature Selection Method for Intrusion Detection System." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.387.
Full textSaid, D., L. Stirling, P. Federolf, and K. Barker. "Data preprocessing for distance-based unsupervised Intrusion Detection." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971981.
Full textZanero, Stefano, and Sergio M. Savaresi. "Unsupervised learning techniques for an intrusion detection system." In the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.967988.
Full textSuman, Chanchal, Somanath Tripathy, and Sriparna Saha. "An Intrusion Detection System Using Unsupervised Feature Selection." In TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929510.
Full textHai, Yong J., Yu Wu, and Guo Y. Wang. "An improved unsupervised clustering-based intrusion detection method." In Defense and Security, edited by Belur V. Dasarathy. SPIE, 2005. http://dx.doi.org/10.1117/12.603086.
Full text