The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, machine learning technology often used as a recognition method of anomaly in anomaly detection. In this paper we have proposed a One-class small hypersphere support vector machine classifier (OCSHSVM) algorithm, which builds a learning classifier model via both normal and abnormal network traffic. This combination of normal and abnormal traffic for training model gives the better...
Our contribution in this paper is two fold. First we provide preliminary investigation results establishing program based anomaly detection is effective if short system call sequences are modeled along with their occurrence frequency. Second as a consequence of this, built normal program model can tolerate some level of contamination in the training dataset. We describe an experimental system Sequencegram,...
Application based intrusion detection involves analysis of network packet payload data. Recently statistical methods for analyzing the payload are being used. Since behavior of every application is not same a different model is necessary for each application. Studies have revealed that higher order n-grams are good for capturing the network profile. In this paper we introduce a concept of layered...
Most of the anomaly based techniques produce vast number of alert messages that include a large percentage of false alarms. One of the widely used technique for anomaly intrusion detection systems (IDS) is cluster analysis. In cluster based IDS, feature vectors generated from network traffic are grouped into clusters as normal or abnormal (raising alert). The main cause for false alert generation...
Network based intrusion detection (NID) involves collection of raw packets from network and analyzing them for anomalous content. This deals with careful collection of required features from the header and payloads of packet. Data mining is one of the most popular technique to mine NID database. Most of the mining algorithms require multiple scans of database which increases the I/O operations and...
In this paper, we use reliability theory to determine the answer of an important question about how often we need to update a piece of secure information. For example, one may need to determine an appropriate time for updating a new password. To generalize, we compute an efficient updating time for a dependable secure computing (DSC) system which stores secret information in a reliable and secure...
The biometric on-card-process solution used on the smart card has a potential for high security with greatly minimized fraud risks in financial sector. In this paper we discuss the palm vein biometric system and its compatibility in financial sector, software design for on-card-processing solution based on Java virtual machine. The solution is stimulated and the result obtained and that was tested...
This paper presents a new probabilistic approach to determine survivability of reconfigurable systems as a system-level performance metric in an operational environment. In contrast to known methods of estimating survivability in terms of susceptibility and vulnerability, the proposed method (1) includes directional threats on various subsystems into the analysis and (2) provides a framework for operational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.