The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, the cyber-space landscape is filled with vulnerabilities and malicious users that exploit them. Adding to this the technological context, with data flooding from all directions, it is evident that maintaining a good level of security for our systems has become a challenge. The high-dimensional datasets generated by all these diverse technologies needs to be processed efficiently. Inside the...
As new security intrusions arise so does the demand for viable intrusion detection systems These solutions must deal with huge data volumes, high speed network traffics and countervail new and various types of security threats. In this paper we combine existing technologies to construct an Anomaly based Intrusion Detection System. Our approach improves the Support Vector Machine classifier by exploiting...
The large number and various technological solutions adopted by many enterprises, overwhelms security systems, which must acquire informations from all these diverse sources and interpret them. Furthermore, the proliferation of more complex cyber threats imposes a difficult task for information security assurance. Therefore, it is clear that new solutions are required. In this paper we propose a wrapper...
Information Security Assurance implies ensuring the integrity, confidentiality and availability of critical assets for an organization. The large amount of events to monitor in a fluid system in terms of topology and variety of new hardware or software, overwhelms monitoring controls. Furthermore, the multi-facets of cyber threats today makes it difficult even for security experts to handle and keep...
The continuous proliferation of more complex and various security threats leads to the conclusion that new solutions are required. Intrusion Detection Systems can be a pertinent solution because they can deal with the large data volumes of logs gathered from the multitude of systems and can even identify new types of attacks if based on anomaly detection. In this paper we propose an IDS model which...
The multitude of hardware and software applications generate a lot of data and burden security solutions that must acquire informations from all these heterogenous systems. Adding the current dynamic and complex cyber threats in this context, make it clear that new security solutions are needed. In this paper we propose a wrapper feature selection approach that combines two machine learning algorithms...
Intrusion Detection Systems(IDS) have become an essential part of every security framework. These systems rely on monitoring and detection of intrusions, thus composing an additional line of defense. Several paradigms have been applied for implementing IDS. In this paper we propose a NIDS model based on Information Gain for feature selection and Support Vector Machines(SVM) for the detection component...
Intrusion Detection Systems(IDS) have become a necessary component of almost every security infrastructure. Recently, Support Vector Machines (SVM) has been employed to provide potential solutions for IDS. With its many variants for classification SVM is a state-of-the-art machine learning algorithm. However, the performance of SVM depends on selection of the appropriate parameters. In this paper...
Web Spam, or Spamdexing, is a form of Search Engine Optimization(SEO) spamming that hinders the efficiency of search engines. These types of exploits use unethical methods in order to place a web page into the first rank. Sabotaging the quality of the results retrieved by search engines can lead users to mistrust the search engine provider. Moreover, spam websites can be a starting point for phishing...
Search engines have become a de facto place to start information acquisition on the Internet. Sabotaging the quality of the results retrieved by search engines can lead users to doubt the search engine provider. Spam websites can serve as means of phishing. This paper shows a spam host detection approach that uses support vector machines(SVM) f o r classification. W e create a parallel version of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.