Back to Results
First PageMeta Content
Data security / Denial-of-service attacks / Intrusion detection system / Anomaly detection / Local outlier factor / Network performance / Misuse detection / Outlier / Denial-of-service attack / Statistics / Data mining / Computer network security


A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection† Aleksandar Lazarevic*, Levent Ertoz*, Vipin Kumar*, Aysel Ozgur*, Jaideep Srivastava* Abstract
Add to Reading List

Document Date: 2003-03-21 18:36:29


Open Document

File Size: 247,54 KB

Share Result on Facebook

City

Mahalobis / Minneapolis / Mahalanobis / /

Company

Oracle / Microsoft / /

Country

United States / /

Event

Natural Disaster / /

Facility

University of Minnesota / /

IndustryTerm

anomaly detection algorithms / information processing / data using tcptrace software / outlier detection algorithms / intrusion detection systems / intrusion detection algorithms / unsupervised learning algorithm / neural networks / packet filtering tool / data mining / intrusion detection algorithm / information systems / data mining algorithms / tcptrace utility software / Internet accessibility falls / detection algorithms / tcptrace software utility / recent outlier detection algorithms / raw tcpdump data using tcptrace software / learning algorithm / unsupervised support vector machine algorithms / /

OperatingSystem

DoS / /

Organization

Army High Performance Computing Research Center / Minnesota Supercomputing Institute / Internet Storm Center / University of Minnesota / Computer Science Department / /

Person

Jaideep Srivastava / Richard Lippmann / Daniel Barbara / Levent Ertoz / /

Position

human analyst / /

ProvinceOrState

Minnesota / /

Technology

learning algorithm / vector machine algorithms / Anomaly detection algorithms / unsupervised algorithm / SVM algorithm / intrusion detection algorithm / data mining algorithms / data mining / proposed algorithms / unsupervised learning algorithm / recent outlier detection algorithms / UDP / supervised SVM algorithm / outlier detection algorithms / intrusion detection algorithms / /

SocialTag