An Intrusion Detection Technique Suitable for TICN
نویسندگان
چکیده
منابع مشابه
Fuzzy Clustering as an Intrusion Detection Technique
Intrusion detection and clustering have always been hot topics in the field of machine learning. Clustering as an intrusion detection technique has long before proved to be beneficial. But as the methods and types of attacks are changing, there is an ongoing need to develop more and more better techniques that can fight back. The main aim of this paper is to use Fuzzy cmedoids algorithm to intr...
متن کاملData Visualization Technique Framework for Intrusion detection
Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction techniqu...
متن کاملEIDA: An Energy-Intrusion aware Data Aggregation Technique for Wireless Sensor Networks
Energy consumption is considered as a critical issue in wireless sensor networks (WSNs). Batteries of sensor nodes have limited power supply which in turn limits services and applications that can be supported by them. An efcient solution to improve energy consumption and even trafc in WSNs is Data Aggregation (DA) that can reduce the number of transmissions. Two main challenges for DA are: (i)...
متن کاملBackground Division, A Suitable Technique for Moving Object Detection
Nowadays, background model does not have any robust solution and constitutes one of the main problems in surveillance systems. Researchers are working in several approaches in order to get better background pixel models. This is a previous step to apply the background subtraction technique and results are not as good as expected. We concentrate our efforts on the second step for segmentation of...
متن کاملA Hybrid Framework for Building an Efficient Incremental Intrusion Detection System
In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Military Science and Technology
سال: 2011
ISSN: 1598-9127
DOI: 10.9766/kimst.2011.14.6.1097