A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
2010
IEICE transactions on information and systems
Jungsuk SONG †a) , Member, Hiroki TAKAKURA † † * b) , Nonmember, Yasuo OKABE † †c) , Daisuke INOUE †d) , Masashi ETO †e) , and Koji NAKAO †f) , Members SUMMARY Intrusion Detection Systems (IDS) have been received considerable attention among the network security researchers as one of the most promising countermeasures to defend our crucial computer systems or networks against attackers on the Internet. Over the past few years, many machine learning techniques have been applied to IDSs so as to
doi:10.1587/transinf.e93.d.2544
fatcat:lg6xwgtcsfaq5ovz4md4wzhofa