Now showing items 1-6 of 6

    • Detecting anomalies by weighted rules 

      Tandon, Gaurav; Chan, Philip K. (2007-01-19)
      Anomaly detection focuses on modeling the normal behavior and identifying significant deviations, which could be novel attacks. The previously proposed LERAD algorithm can efficiently learn a succinct set of comprehensible ...
    • Learning rules from system call arguments and sequences for anomaly detection 

      Tandon, Gaurav; Chan, Philip K. (2003-06-11)
      Many approaches have been suggested and various systems have been modeled to detect intrusions from anomalous behavior of systems calls as a result of an attack. Though these techniques have been shown to be quite effective, ...
    • Machine learning for host-based anomaly detection 

      Tandon, Gaurav (2008-04-23)
      Anomaly detection techniques complement signature based methods for intrusion detection. Machine learning approaches are applied to anomaly detection for automated learning and detection. Traditional host-based anomaly ...
    • MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences 

      Tandon, Gaurav; Mitra, Debasis; Chan, Philip K. (2004-06-07)
      Most of the prevalent anomaly detection systems use some training data to build models. These models are then utilized to capture any deviations resulting from possible intrusions. The efficacy of such systems is highly ...
    • A representation scheme for finite length strings 

      Tandon, Gaurav; Mitra, Debasis (2003-04-01)
      This study is an attempt to create a canonical representation scheme for finite length strings to simplify the study of the theory behind different classes of patterns and to ease the understanding of the underlying ...
    • Spatio-temporal anomaly detection for mobile devices 

      Tandon, Gaurav; Chan, Philip K. (2007-08-03)
      With the increase in popularity of mobile devices, there has been a significant rise in mobile related security problems. The biggest threat for a mobile subscriber is lost or stolen device, which can lead to confidential ...