A survey of network-based intrusion detection data sets

M Ring, S Wunderlich, D Scheuring, D Landes… - Computers & …, 2019 - Elsevier
Labeled data sets are necessary to train and evaluate anomaly-based network intrusion
detection systems. This work provides a focused literature survey of data sets for network …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

[KNIHA][B] Data mining and machine learning in cybersecurity

S Dua, X Du - 2016 - books.google.com
From basic concepts in machine learning and data mining to advanced problems in the
machine learning domain, this book provides a unified reference for specific machine …

Class discovery for automated discovery, attribution, analysis, and risk assessment of security threats

A Nucci, PM Comar, S Saha, L Liu - US Patent 8,418,249, 2013 - Google Patents
(57) ABSTRACT A method for profiling network traffic of a network. The method includes
obtaining a signature library comprising a plurality of signatures corresponding to a plurality …

Combining supervised and unsupervised learning for zero-day malware detection

PM Comar, L Liu, S Saha, PN Tan… - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
Malware is one of the most damaging security threats facing the Internet today. Despite the
burgeoning literature, accurate detection of malware remains an elusive and challenging …

Automated discovery, attribution, analysis, and risk assessment of security threats

A Nucci, S Saha - US Patent 9,094,288, 2015 - Google Patents
In general, in one aspect, the present invention relates to a method for profiling network
traffic of a network. The method includes obtaining a signature library comprising a plurality …

An efficient pattern mining approach for event detection in multivariate temporal data

I Batal, GF Cooper, D Fradkin, J Harrison… - … and information systems, 2016 - Springer
This work proposes a pattern mining approach to learn event detection models from
complex multivariate temporal data, such as electronic health records. We present recent …

OMC-IDS: At the cross-roads of OLAP mining and intrusion detection

H Brahmi, I Brahmi, S Ben Yahia - Pacific-Asia Conference on Knowledge …, 2012 - Springer
Due to the growing threat of network attacks, the efficient detection as well as the network
abuse assessment are of paramount importance. In this respect, the Intrusion Detection …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

Systems and methods for content type classification

S Wei, ZQ Chen, P Ng, G Duan - US Patent 9,716,644, 2017 - Google Patents
Various embodiments illustrated and described herein include systems, methods and
Software for content type classification. Some Such embodiments include determining a …