Literatura académica sobre el tema "Unsupervised intrusion detection"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Unsupervised intrusion detection".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Unsupervised intrusion detection"
ZHONG, SHI, TAGHI M. KHOSHGOFTAAR y NAEEM SELIYA. "CLUSTERING-BASED NETWORK INTRUSION DETECTION". International Journal of Reliability, Quality and Safety Engineering 14, n.º 02 (abril de 2007): 169–87. http://dx.doi.org/10.1142/s0218539307002568.
Texto completoHajamydeen, Asif Iqbal y Nur Izura Udzir. "A Detailed Description on Unsupervised Heterogeneous Anomaly Based Intrusion Detection Framework". Scalable Computing: Practice and Experience 20, n.º 1 (9 de marzo de 2019): 113–60. http://dx.doi.org/10.12694/scpe.v20i1.1465.
Texto completoZoppi, Tommaso, Mohamad Gharib, Muhammad Atif y Andrea Bondavalli. "Meta-Learning to Improve Unsupervised Intrusion Detection in Cyber-Physical Systems". ACM Transactions on Cyber-Physical Systems 5, n.º 4 (31 de octubre de 2021): 1–27. http://dx.doi.org/10.1145/3467470.
Texto completoMeira, Jorge. "Comparative Results with Unsupervised Techniques in Cyber Attack Novelty Detection". Proceedings 2, n.º 18 (17 de septiembre de 2018): 1191. http://dx.doi.org/10.3390/proceedings2181191.
Texto completoCasas, Pedro, Johan Mazel y Philippe Owezarski. "Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge". Computer Communications 35, n.º 7 (abril de 2012): 772–83. http://dx.doi.org/10.1016/j.comcom.2012.01.016.
Texto completoZhao, Yi Lin y Qing Lei Zhou. "Intrusion Detection Method Based on LEGClust Algorithm". Applied Mechanics and Materials 263-266 (diciembre de 2012): 3025–33. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.3025.
Texto completoAlmalawi, Abdulmohsen, Adil Fahad, Zahir Tari, Asif Irshad Khan, Nouf Alzahrani, Sheikh Tahir Bakhsh, Madini O. Alassafi, Abdulrahman Alshdadi y Sana Qaiyum. "Add-On Anomaly Threshold Technique for Improving Unsupervised Intrusion Detection on SCADA Data". Electronics 9, n.º 6 (18 de junio de 2020): 1017. http://dx.doi.org/10.3390/electronics9061017.
Texto completoLi, Longlong, Qin Chen, Shuiming Chi y Xiaohang Liu. "Unsupervised Intrusion Detection based on FCM and Vote Mechanism". Information Technology Journal 13, n.º 1 (15 de diciembre de 2013): 133–39. http://dx.doi.org/10.3923/itj.2014.133.139.
Texto completoIraqi, Omar y Hanan El Bakkali. "Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention". Security and Communication Networks 2019 (28 de julio de 2019): 1–13. http://dx.doi.org/10.1155/2019/8368473.
Texto completoMin, Luo, Zhang Huan-guo y Wang Li-na. "Research and implementation of unsupervised clustering-based intrusion detection". Wuhan University Journal of Natural Sciences 8, n.º 3 (septiembre de 2003): 803–7. http://dx.doi.org/10.1007/bf02900819.
Texto completoTesis sobre el tema "Unsupervised intrusion detection"
Siddiqui, Abdul Jabbar. "Securing Connected and Automated Surveillance Systems Against Network Intrusions and Adversarial Attacks". Thesis, Université d'Ottawa / University of Ottawa, 2021. http://hdl.handle.net/10393/42345.
Texto completoSong, Jungsuk. "Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning". 京都大学 (Kyoto University), 2009. http://hdl.handle.net/2433/123840.
Texto completoDang, Binh Hy. "Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks". NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/128.
Texto completoMathur, Nitin O. "Application of Autoencoder Ensembles in Anomaly and Intrusion Detection using Time-Based Analysis". University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin161374876195402.
Texto completoLabonne, Maxime. "Anomaly-based network intrusion detection using machine learning". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS011.
Texto completoIn recent years, hacking has become an industry unto itself, increasing the number and diversity of cyber attacks. Threats on computer networks range from malware to denial of service attacks, phishing and social engineering. An effective cyber security plan can no longer rely solely on antiviruses and firewalls to counter these threats: it must include several layers of defence. Network-based Intrusion Detection Systems (IDSs) are a complementary means of enhancing security, with the ability to monitor packets from OSI layer 2 (Data link) to layer 7 (Application). Intrusion detection techniques are traditionally divided into two categories: signatured-based (or misuse) detection and anomaly detection. Most IDSs in use today rely on signature-based detection; however, they can only detect known attacks. IDSs using anomaly detection are able to detect unknown attacks, but are unfortunately less accurate, which generates a large number of false alarms. In this context, the creation of precise anomaly-based IDS is of great value in order to be able to identify attacks that are still unknown.In this thesis, machine learning models are studied to create IDSs that can be deployed in real computer networks. Firstly, a three-step optimization method is proposed to improve the quality of detection: 1/ data augmentation to rebalance the dataset, 2/ parameters optimization to improve the model performance and 3/ ensemble learning to combine the results of the best models. Flows detected as attacks can be analyzed to generate signatures to feed signature-based IDS databases. However, this method has the disadvantage of requiring labelled datasets, which are rarely available in real-life situations. Transfer learning is therefore studied in order to train machine learning models on large labeled datasets, then finetune them on benign traffic of the network to be monitored. This method also has flaws since the models learn from already known attacks, and therefore do not actually perform anomaly detection. Thus, a new solution based on unsupervised learning is proposed. It uses network protocol header analysis to model normal traffic behavior. Anomalies detected are then aggregated into attacks or ignored when isolated. Finally, the detection of network congestion is studied. The bandwidth utilization between different links is predicted in order to correct issues before they occur
Tjhai, Gina C. "Anomaly-based correlation of IDS alarms". Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/308.
Texto completoAwodokun, Olugbenga. "Classification of Patterns in Streaming Data Using Clustering Signatures". University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504880155623189.
Texto completoPierrot, David. "Détection dynamique des intrusions dans les systèmes informatiques". Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE2077.
Texto completoThe expansion and democratization of the digital world coupled with the effect of the Internet globalization, has allowed individuals, countries, states and companies to interconnect and interact at incidence levels never previously imagined. Cybercrime, in turn, is unfortunately one the negative aspects of this rapid global interconnection expansion. We often find malicious individuals and/or groups aiming to undermine the integrity of Information Systems for either financial gain or to serve a cause. The consequences of an intrusion can be problematic for the existence of a company or an organization. The impacts are synonymous with financial loss, brand image degradation and lack of seriousness. The detection of an intrusion is not an end in itself, the reduction of the delta detection-reaction has become a priority. The different existing solutions prove to be cumbersome to set up. Research has identified more efficient data mining methods, but integration into an information system remains difficult. Capturing and converting protected resource data does not allow detection within acceptable time frames. Our contribution helps to detect intrusions. Protect us against Firewall events which reduces the need for computing power while limiting the knowledge of the information system by intrusion detectors. We propose an approach taking into account the technical aspects by the use of a hybrid method of data mining but also the functional aspects. The addition of these two aspects is grouped into four phases. The first phase is to visualize and identify network activities. The second phase concerns the detection of abnormal activities using data mining methods on the source of the flow but also on the targeted assets. The third and fourth phases use the results of a risk analysis and a safety verification technique to prioritize the actions to be carried out. All these points give a general vision on the hygiene of the information system but also a direction on monitoring and corrections to be made.The approach developed to a prototype named D113. This prototype, tested on a platform of experimentation in two architectures of different size made it possible to validate our orientations and approaches. The results obtained are positive but perfectible. Prospects have been defined in this direction
Stomeo, Carlo. "Applying Machine Learning to Cyber Security". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17303/.
Texto completoLu, Wei. "Unsupervised anomaly detection framework for multiple-connection based network intrusions". Thesis, 2005. http://hdl.handle.net/1828/1949.
Texto completoCapítulos de libros sobre el tema "Unsupervised intrusion detection"
Singh, Jai Puneet y Nizar Bouguila. "Intrusion Detection Using Unsupervised Approach". En Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 192–201. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67837-5_18.
Texto completoLaskov, Pavel, Patrick Düssel, Christin Schäfer y Konrad Rieck. "Learning Intrusion Detection: Supervised or Unsupervised?" En Image Analysis and Processing – ICIAP 2005, 50–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11553595_6.
Texto completoGuan, Yu, Ali A. Ghorbani y Nabil Belacel. "An Unsupervised Clustering Algorithm for Intrusion Detection". En Advances in Artificial Intelligence, 616–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44886-1_60.
Texto completoCorona, Igino, Giorgio Giacinto y Fabio Roli. "Intrusion Detection in Computer Systems Using Multiple Classifier Systems". En Supervised and Unsupervised Ensemble Methods and their Applications, 91–113. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-78981-9_5.
Texto completoMakkar, Garima, Malini Jayaraman y Sonam Sharma. "Network Intrusion Detection in an Enterprise: Unsupervised Analytical Methodology". En Data Management, Analytics and Innovation, 451–63. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1402-5_34.
Texto completoPark, Kyung Ho, Eunji Park y Huy Kang Kim. "Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort". En Information Security Applications, 45–58. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_4.
Texto completoKaur, Sanmeet y Ishan Garg. "Ensemble Technique Based on Supervised and Unsupervised Learning Approach for Intrusion Detection". En Communications in Computer and Information Science, 228–38. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_23.
Texto completoMin, Erxue, Jun Long, Qiang Liu, Jianjing Cui, Zhiping Cai y Junbo Ma. "SU-IDS: A Semi-supervised and Unsupervised Framework for Network Intrusion Detection". En Cloud Computing and Security, 322–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_30.
Texto completoDahiya, Priyanka y Devesh Kumar Srivastava. "A Comparative Evolution of Unsupervised Techniques for Effective Network Intrusion Detection in Hadoop". En Communications in Computer and Information Science, 279–87. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1813-9_28.
Texto completoLuo, Min, Lina Wang, Huanguo Zhang y Jin Chen. "A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine". En Information and Communications Security, 325–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39927-8_30.
Texto completoActas de conferencias sobre el tema "Unsupervised intrusion detection"
Zanero, Stefano y Giuseppe Serazzi. "Unsupervised learning algorithms for intrusion detection". En NOMS 2008 - 2008 IEEE Network Operations and Management Symposium. IEEE, 2008. http://dx.doi.org/10.1109/noms.2008.4575276.
Texto completoZhang, Jiong y Mohammad Zulkernine. "Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection". En 2006 IEEE International Conference on Communications. IEEE, 2006. http://dx.doi.org/10.1109/icc.2006.255127.
Texto completoWang, Zuohua. "Unsupervised intrusion detection algorithm based on association amendment". En 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2014. http://dx.doi.org/10.1109/fskd.2014.6980960.
Texto completoZhang, Cuixiao, Guobing Zhang y Shanshan Sun. "A Mixed Unsupervised Clustering-Based Intrusion Detection Model". En 2009 3rd International Conference on Genetic and Evolutionary Computing (WGEC). IEEE, 2009. http://dx.doi.org/10.1109/wgec.2009.72.
Texto completoHarbi, Nouria y Emna Bahri. "Real detection intrusion using supervised and unsupervised learning". En 2013 International Conference of Soft Computing and Pattern Recognition (SoCPaR). IEEE, 2013. http://dx.doi.org/10.1109/socpar.2013.7054151.
Texto completoAmbusaidi, Mohammed A., Xiangjian He y Priyadarsi Nanda. "Unsupervised Feature Selection Method for Intrusion Detection System". En 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.387.
Texto completoSaid, D., L. Stirling, P. Federolf y K. Barker. "Data preprocessing for distance-based unsupervised Intrusion Detection". En 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971981.
Texto completoZanero, Stefano y Sergio M. Savaresi. "Unsupervised learning techniques for an intrusion detection system". En the 2004 ACM symposium. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/967900.967988.
Texto completoSuman, Chanchal, Somanath Tripathy y Sriparna Saha. "An Intrusion Detection System Using Unsupervised Feature Selection". En TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON). IEEE, 2019. http://dx.doi.org/10.1109/tencon.2019.8929510.
Texto completoHai, Yong J., Yu Wu y Guo Y. Wang. "An improved unsupervised clustering-based intrusion detection method". En Defense and Security, editado por Belur V. Dasarathy. SPIE, 2005. http://dx.doi.org/10.1117/12.603086.
Texto completo