An Evaluation of Intrusion Detection System on Jubatus

0Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The network intrusion is becoming a big threat for a lot of companies, organization and so on. Recent intrusions are becoming more clever and difficult to detect. Many of today's intrusion detection systems are based on signature-based. They have good performance for known attacks, but theoretically they are not able to detect unknown attacks. On the other hand, an anomaly detection system can detect unknown attacks and is getting focus recently. In this paper, we study the effectiveness and the performance experiments of one of the major anomaly detection scales, LOF, on distributed online machine learning framework, Jubatus. © Springer International Publishing Switzerland 2015.

Cite

CITATION STYLE

APA

Ogino, T. (2015). An Evaluation of Intrusion Detection System on Jubatus. In Advances in Intelligent Systems and Computing (Vol. 1089, pp. 359–364). Springer Verlag. https://doi.org/10.1007/978-3-319-08422-0_53

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free