Search results for "Intrusion"

showing 9 items of 159 documents

Integrated interpretation of geophysical surveys aimed at tridimensional modeling of a coastal aquifer subjected to sea-water intrusion

2011

sea-water intrusion ERT TDEMSettore GEO/11 - Geofisica Applicata
researchProduct

On Grice's circle

2006

semantics/pragmatics debate - Grice's circleSettore M-FIL/05 - Filosofia E Teoria Dei LinguaggiGrice's circle explicatures ragmatic intrusion
researchProduct

An Intrusion Detection System for Fog Computing and IoT based Logistic Systems using a Smart Data Approach

2016

The Internet of Things (IoT) is widely used in advanced logistic systems. Safety and security of such systems are utmost important to guarantee the quality of their services. However, such systems are vulnerable to cyber-attacks. Development of lightweight anomaly based intrusion detection systems (IDS) is one of the key measures to tackle this problem. In this paper, we present a new distributed and lightweight IDS based on an Artificial Immune System (AIS). The IDS is distributed in a three-layered IoT structure including the cloud, fog and edge layers. In the cloud layer, the IDS clusters primary network traffic and trains its detectors. In the fog layer, we take advantage of a smart dat…

smart dataintrusion detection systemsesineiden internetfog computing
researchProduct

Adaptive framework for network traffic classification using dimensionality reduction and clustering

2012

Information security has become a very important topic especially during the last years. Web services are becoming more complex and dynamic. This offers new possibilities for attackers to exploit vulnerabilities by inputting malicious queries or code. However, these attack attempts are often recorded in server logs. Analyzing these logs could be a way to detect intrusions either periodically or in real time. We propose a framework that preprocesses and analyzes these log files. HTTP queries are transformed to numerical matrices using n-gram analysis. The dimensionality of these matrices is reduced using principal component analysis and diffusion map methodology. Abnormal log lines can then …

ta113Computer scienceNetwork securitybusiness.industryDimensionality reductionintrusion detectionk-meansdiffusion mapServer logcomputer.software_genreanomaly detectionTraffic classificationkoneoppiminenWeb log analysis softwareAnomaly detectionData miningWeb servicetiedonlouhintaCluster analysisbusinesscomputern-grams
researchProduct

A Network-Based Framework for Mobile Threat Detection

2018

Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…

ta113Computer scienceintrusion detectionmobile threatsFeature extractionEvasion (network security)concept-driftAdversaryComputer securitycomputer.software_genreFlow networkMobile malwareanomaly detectionVariety (cybernetics)haittaohjelmatmachine learningkoneoppiminenmobiililaitteetMalwaretietoturvacomputerHumanoid robot
researchProduct

Online anomaly detection using dimensionality reduction techniques for HTTP log analysis

2015

Modern web services face an increasing number of new threats. Logs are collected from almost all web servers, and for this reason analyzing them is beneficial when trying to prevent intrusions. Intrusive behavior often differs from the normal web traffic. This paper proposes a framework to find abnormal behavior from these logs. We compare random projection, principal component analysis and diffusion map for anomaly detection. In addition, the framework has online capabilities. The first two methods have intuitive extensions while diffusion map uses the Nyström extension. This fast out-of-sample extension enables real-time analysis of web server traffic. The framework is demonstrated using …

ta113Web serverComputer Networks and Communicationsbusiness.industryComputer scienceRandom projectionDimensionality reductionRandom projectionPrincipal component analysisIntrusion detection systemAnomaly detectionMachine learningcomputer.software_genreCyber securityWeb trafficPrincipal component analysisDiffusion mapAnomaly detectionIntrusion detectionArtificial intelligenceData miningWeb servicebusinesskyberturvallisuuscomputer
researchProduct

An Efficient Network Log Anomaly Detection System Using Random Projection Dimensionality Reduction

2014

Network traffic is increasing all the time and network services are becoming more complex and vulnerable. To protect these networks, intrusion detection systems are used. Signature-based intrusion detection cannot find previously unknown attacks, which is why anomaly detection is needed. However, many new systems are slow and complicated. We propose a log anomaly detection framework which aims to facilitate quick anomaly detection and also provide visualizations of the network traffic structure. The system preprocesses network logs into a numerical data matrix, reduces the dimensionality of this matrix using random projection and uses Mahalanobis distance to find outliers and calculate an a…

ta113random projectionMahalanobis distanceComputer sciencebusiness.industryAnomaly-based intrusion detection systemintrusion detectionDimensionality reductionRandom projectionPattern recognitionIntrusion detection systemcomputer.software_genrekoneoppiminenAnomaly detectionData miningArtificial intelligencetiedonlouhintaAnomaly (physics)mahalanobis distancebusinesscomputerCurse of dimensionality2014 6th International Conference on New Technologies, Mobility and Security (NTMS)
researchProduct

El carácter transdiagnóstico de las intrusiones mentales/ Transdiagnostic nature of unwanted mental intrusions

2019

Unwanted mental intrusions (UMIs) and their functional consequences had been proposed as symptom dimensions in current cognitive models of Obsessive-Compulsive Disorder (OCD), Body Dysmorphic Disorder (BDD), Illness Anxiety/Hypochondriasis (IA/H) and Eating Disorders (EDs). The main purpose of this doctoral dissertation was to ascertain the transdiagnostic nature of UMIs, above and beyond their specific contents, i.e., obsessional, appearance defects, illness and death, and eating disorders-related. To this end, the Questionnaire of Unpleasant Intrusive Thoughts (QUIT) was designed, and, based on it, four studies were conducted. Studies 1 and 2 examined the transdiagnostic nature of UMIs, b…

transdiagnósticointrusiones mentales no deseadasbody dysmorphic disorder:PSICOLOGÍA [UNESCO]unwanted mental intrusionstrastorno obsesivo-compulsivoeating disordersUNESCO::PSICOLOGÍAobsessive-compulsive disorderintrusive thoughtstransdiagnosticmental disorderstrastorno dismórfico corporalhipocondríahypochondriassistrastornos alimentarios
researchProduct

Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets

2015

Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast to detrimental the networks and hosts. Due to these reasons real-time monitoring, processing and intrusion detection are now among the key features of NIDS. Traditional types of intrusion detection systems such as signature base IDS are not able detect intrusions with new and complex strategies. Now days, automatic traffic analysis and anomaly intrusion detection became more efficient in field of network security however they suffer from high number of false alarms. Among all …

tunkeilijan havaitsemisjärjestelmätintrusion detectionmonitorointitietoliikenneverkottiedonsiirtoanomaly detectionreaaliaikaisuusmachine learningclustering (unsupervised)koneoppiminenalgoritmitnetwork securityklusterianalyysitietoturvaverkkohyökkäykset
researchProduct