Intrusion Detection Models Based on Data Mining
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental techniq...
Main Authors: | Guojun Mao, Xindong Wu, Xuxian Jiang |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer
2012-02-01
|
Series: | International Journal of Computational Intelligence Systems |
Subjects: | |
Online Access: | https://www.atlantis-press.com/article/25867956.pdf |
Similar Items
-
Big data technology for computer intrusion detection
by: Chen Ying
Published: (2023-04-01) -
Online Mining Intrusion Patterns from IDS Alerts
by: Kai Zhang, et al.
Published: (2020-04-01) -
Intelligent Processing of Intrusion Detection Data
by: Tao Duan, et al.
Published: (2020-01-01) -
Intrusion Detection Based on Spatiotemporal Characterization of Cyberattacks
by: Jiyeon Kim, et al.
Published: (2020-03-01) -
Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
by: Fadi Salo, et al.
Published: (2018-01-01)