Evaluating Pattern Recognition Techniques in Intrusion Detection Systems

@inproceedings{Esposito2005EvaluatingPR,
  title={Evaluating Pattern Recognition Techniques in Intrusion Detection Systems},
  author={Marcello Esposito and Claudio Mazzariello and Francesco Oliviero and Simon Pietro Romano and Carlo Sansone},
  booktitle={PRIS},
  year={2005}
}
Pattern recognition is the discipline studying the design and operation of systems capable to recognize patterns with specific properties in data so urce . Intrusion detection, on the other hand, is in charge of identifying anomalou s activities by analyzing a data source, be it the logs of an operating system or in the network traffic. It is easy to find similarities between such research fields , and it is straightforward to think of a way to combine them. As to the descriptions abov e, we… CONTINUE READING

From This Paper

Figures, tables, and topics from this paper.

References

Publications referenced by this paper.
Showing 1-10 of 16 references

Snort 2.1 Intrusion Detection - Second Edition

A. R. Baker, B. Caswell, M. Poor
Syngress • 2004
View 1 Excerpt

An Introduction to Boosting and Leveraging

Machine Learning Summer School • 2002
View 1 Excerpt

Detecting intrusion by data

D. Barbara, J. Couto, +3 authors N. Adam
Workshop on Information Assurance and Security • 2001
View 2 Excerpts

Difficulties in simulating the internet

IEEE/ACM Trans. Netw. • 2001
View 1 Excerpt

Cos t-ba ed modeling for fraud and intrusion detection results from the jam project

S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, P. Chan
Proceeding of the 2 000 DARPA Information Survivability Conferance and Exposition (DISCEX ’00). • 2000
View 1 Excerpt

Derbi: Diagnosys explanation and recovery from comp uter break-ins

M. Tyson
Technical report • 2000
View 1 Excerpt

How to guide - implementing a network based in trusion detection system

B. Laing, J. Alderson
Technical report, Internet Security Systems, Sovereign Hou se, 57/59 Vaster Road, Reading • 2000
View 2 Excerpts