Combining Multiple Techniques for Intrusion Detection

  title={Combining Multiple Techniques for Intrusion Detection},
  author={Chaker Katar},
  • Chaker Katar
  • Published 2006
Most intrusion detection systems (IDS) are based on a single algorithm that is designed to either model the normal behaviour patterns or attack signatures in network data traffic. Most often, these systems fail to provide adequate alarm capability that reduces false positive and false negative rates. We here propose a double multiple-model approach capable of enhancing the overall performance of IDS. In a first step, every group of identical intrusion detection models are combined independently… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 34 references

Methods of combining multiple classifiers and their applications to handwriting recognition

IEEE Trans. Systems, Man, and Cybernetics • 1992
View 4 Excerpts
Highly Influenced

Evidence combination in medical data mining

International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. • 2004
View 1 Excerpt

Srihari , Combination of Type III Digit Recognizers using the DempsterShafer Theory of Evidence

I. T. Catalin, N. Sargur
Proceedings of the Seventh International Conference on Document Analysis and Recognition ( ICDAR • 2003

Similar Papers

Loading similar papers…