In this paper, we aim to develop a systematic framework to semi-automate the process of system logs and databases of intrusion detection systems (IDS). We use both Ef-attribute based mining and Es-attribute based mining to mine effective and essential attributes (hence interesting patterns) from the vast and miscellaneous system logs and IDS databases. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Liu, W., Wu, J. P., Duan, H. X., & Li, X. (2005). New method for intrusion features mining in IDS. In Lecture Notes in Computer Science (Vol. 3644, pp. 429–437). Springer Verlag. https://doi.org/10.1007/11538059_45
Mendeley helps you to discover research relevant for your work.