The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The traditional IDS can not effectively manage the new continuously changing intrusion detection attacks. To deal with the problem, data mining based intrusion detection methods have been the hot fields in intrusion detection research. An outlier mining based adaptive intrusion detection framework is proposed in this paper. In the proposed framework, the outliers are firstly detected by similarity...
Along with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This paper proposes a credit card fraud detection model using outlier detection based on distance sum according to the infrequency and unconventionality of fraud in credit card transaction...
Database authentication verifies valuable content from illicit copying, illegal redistribution and maliciously tamper while it is to be sold or be outsourced to un-trusted parties. This paper exploits the digital watermarking technology for guaranteeing the database integrity underlying distortion free of database content. The proposed scheme employs SVR predictive function to obtain characteristic...
It is of strategic importance for our cyber space security to be able to trace back to the origin of an Internet attack. However, it is particularly challenging due to the evading techniques that attackers use: IP spoofing and attacking across stepping stones. A number of attack traceback methods have been proposed; most of them deal with DoS/DDoS attacks or do not perform well in a non-cooperate...
This paper presents a digital watermarking technology for guaranteeing the database integrity. The proposed scheme based on the fragile watermarking technique, exploits trained support vector regression (SVR) predicting function to distribute the digital watermark over the particular numeric attributes to achieve embedding and detecting watermark by the same SVR predicting function. If the absolute...
Packet content scanning at high speed has become extremely important due to its applications in network security, network monitoring, HTTP load balancing, etc. In content scanning, the packet payload is compared against a set of patterns specified as regular expressions. In this paper, we first show that memory requirements using traditional methods are prohibitively high for many patterns used in...
New network applications like intrusion detection systems and packet-level accounting require multi-match packet classification, where all matching filters need to be reported. Ternary Content Addressable Memories (TCAMs) have been adopted to solve the multi-match classification problem due to their ability to perform fast parallel matching. However, TCAM is expensive and consumes large amounts of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.