Shaohua Teng

Learn More
Researchers have done lots of work in scan attack detection. Various methods have been proposed. Although these methods can defense some scan attacks from hackers in some degree, there are lots of missing detections and false alerts. Especially current intrusion detection systems are difficult to satisfy the demand of large-scale distributed network. After(More)
The image of a face varies with the illumination, pose, and facial expression, thus we say that a single face image is of high uncertainty for representing the face. In this sense, a face image is just an observation and it should not be considered as the absolutely accurate representation of the face. As more face images from the same person provide more(More)
Apriori is one of the most important algorithms used in rule association mining. In this paper, we first discuss the limitations of the Apriori algorithm and then propose an enhancement for improving its efficiency. The improved algorithm is based on the combination of forward scan and reverse scan of a given database. If certain conditions are satisfied,(More)
—As the network information includes a large number of noise data, in order to reduce or eliminate the noise impact on constructing the hyperplane of SVM, this paper firstly preprocesses the data. Then the fuzzy membership function is introduced into SVM. The fuzzy membership function acquires different values for each input data according to different(More)
Wireless networks provide limited reliability and less bandwidth than fixed networks for mobile nodes. And all mobile nodes are highly energy dependent as they use batteries with a limited capacity. Because of their physical portability, they can be used even when they move. This may require using different wireless networks while the node is moving. In(More)
When a new intrusion means is developed, many intrusion methods can be derived by exchanging the command sequences or by replacing commands with the functionally similar commands, which makes the detection of the developed intrusion very difficult. To overcome this problem, a cooperative intrusion detection model based on scenario is proposed, which is(More)
A large number of noise data always exits when obtaining information through Internet, which deteriorates intrusion detection performance. In order to avoid the affection of noise data, data preprocessing needs to be done before the construction of hyperplane in Support Vector Machine (SVM). By importing fuzzy theory into SVM, a new method is proposed for(More)
It is important that the training time of the Support Vector Machine (SVM) is shortened and storage space requirement is reduced for high-speed and large-scale network. An intrusion detection method based on parallel SVM is proposed and a detection model system is constructed in this paper. First, original training dataset gained from network is divided(More)