Noureddine Boudriga

Learn More
Anomaly-based intrusion detection is a crucial research issue as it permits to identify attacks that does not necessarily have known signatures. However, approaches using anomalies often consume more resources than those based on misuse detection and have a higher false alarm rate. This paper presents an efficient anomaly analysis method that is proved to(More)
35 T he Internet has emerged as the most popular method for disseminating information and accessing services on communication networks. Organizations are increasing their in-tranet and Internet use, thus making their virtual chain values more efficient while offering better Web service customization. The Web's growth, however, has made it difficult to(More)