نتایج جستجو برای: anomaly based detection
تعداد نتایج: 3344676 فیلتر نتایج به سال:
The application of anomaly detection has been given a special place among the different processings of hyperspectral images. Nowadays, many of the methods only use background information to detect between anomaly pixels and background. Due to noise and the presence of anomaly pixels in the background, the assumption of the specific statistical distribution of the background, as well as the co...
Corruption is universally considered as an undesirable characteristic of public services. But despite attempts to simplify and automate such services, there is very little prior work to detect, handle or prevent corruption in computation literature. This is particularly surprising given the significant advances made in detecting fraud, a relevant but different form of public impropriety afflict...
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
anomaly detection (ad) has recently become an important application of hyperspectral images analysis. the goal of these algorithms is to find the objects in the image scene which are anomalous in comparison to their surrounding background. one way to improve the performance and runtime of these algorithms is to use dimensionality reduction (dr) techniques. this paper evaluates the effect of thr...
Mobile Ad-hoc Networks (MANETs) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. Therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. In this paper, two methods proposed for dynamic anom...
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system [22]. Our benchmarks on the 1999 DARPA data set [15] show a higher detection rate and lower number of false positives than PAYL and PHAD.
Intrusion detection system (IDS) has played a central role as an appliance tooliance toely defend our crucial computer systems or networks against attackers on the Internet. The most widely deployed and commercially available methods for intrusion detection employ signaturebased detection. However, they cannot detect unknown intrusions intrinsically which are not matched to the signatures, and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید