Machine learning in intrusion detection

Machine learning in intrusion detection


  • Release: 2005
  • Publisher:
  • Price: FREE
  • File: PDF, 202 page
  • ISBN: UCAL:X70931
GET EBOOK

Detection of anomalies in data is one of the fundamental machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate that our approach is able to effectively detect intrusive program behavior while a low false positive rate is achieved. Second, we describe an adaptive anomaly detection framework that is de- signed to handle concept drift and online learning for dynamic, changing environments. Through the use of unsupervised evolving connectionist systems, normal behavior changes are efficiently accommodated while anomalous activities can still be recognized. We demonstrate the performance of our adaptive anomaly detection systems and show that the false positive rate can be significantly reduced.

Seawater Intrusion in Coastal Aquifers

Seawater Intrusion in Coastal Aquifers


  • Release: 2013-03-09
  • Publisher: Springer Science & Business Media
  • Price: FREE
  • File: PDF, 627 page
  • ISBN: 9789401729697
GET EBOOK

Coastal aquifers serve as major sources for freshwater supply in many countries around the world, especially in arid and semi-arid zones. Many coastal areas are also heavily urbanized, a fact that makes the need for freshwater even more acute. Coastal aquifers are highly sensitive to disturbances. Inappropriate management of a coastal aquifer may lead to its destruction as a source for freshwater much earlier than other aquifers which are not connected to the sea. The reason is the threat of seawater intrusion. In many coastal aquifers, intrusion of seawater has become one of the major constraints imposed on groundwater utilization. As sea water intrusion progresses, existing pumping wells, especially those close to the coast, become saline and have to be abandoned. Also, the area above the intruding seawater wedge is lost as a source of natural replenishment to the aquifer. Despite the importance of this subject, so far there does not exist a book that integrates our present knowledge of seawater intrusion, its occurrences, physical mechanism, chemistry, exploration by geo physical and geochemical techniques, conceptual and mathematical modeling, analytical and numerical solution methods, engineering measures of combating seawater intrusion, management strategies, and experience learned from case studies. By presenting this fairly comprehensive volume on the state-of-the-art of knowledge and ex perience on saltwater intrusion, we hoped to transfer this body of knowledge to the geologists, hydrologists, hydraulic engineers, water resources planners, managers, and governmental policy makers, who are engaged in the sustainable development of coastal fresh ground water resources.

IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS

IGNEOUS INTRUSION IMPACTS ON WASTE PACKAGES AND WASTE FORMS


  • Release: 2004
  • Publisher:
  • Price: FREE
  • File: PDF, page
  • ISBN: OCLC:316448872
GET EBOOK

The purpose of this model report is to assess the potential impacts of igneous intrusion on waste packages and waste forms in the emplacement drifts at the Yucca Mountain Repository. The models are based on conceptual models and includes an assessment of deleterious dynamic, thermal, hydrologic, and chemical impacts. The models described in this report constitute the waste package and waste form impacts submodel of the Total System Performance Assessment for the License Application (TSPA-LA) model assessing the impacts of a hypothetical igneous intrusion event on the repository total system performance. This submodel is carried out in accordance with Technical Work Plan for Waste Form Degradation Modeling, Testing, and Analyses in Support of LA (BSC 2004 [DIRS:167796]) and Total System Performance Assessment-License Application Methods and Approaches (BSC 2003 [DIRS: 166296]). The technical work plan was prepared in accordance with AP-2.27Q, Planning for Science Activities. Any deviations from the technical work plan are documented in the following sections as they occur. The TSPA-LA approach to implementing the models for waste package and waste form response during igneous intrusion is based on identification of damage zones. Zone 1 includes all emplacement drifts intruded by the basalt dike, and Zone 2 includes all other emplacement drifts in the repository that are not in Zone 1. This model report will document the following model assessments: (1) Mechanical and thermal impacts of basalt magma intrusion on the invert, waste packages and waste forms of the intersected emplacement drifts of Zone 1. (2) Temperature and pressure trends of basaltic magma intrusion intersecting Zone 1 and their potential effects on waste packages and waste forms in Zone 2 emplacement drifts. (3) Deleterious volatile gases, exsolving from the intruded basalt magma and their potential effects on waste packages of Zone 2 emplacement drifts. (4) Post-intrusive physical-chemical environmen

Intrusion

Intrusion


  • Release: 2012-03-01
  • Publisher: Hachette UK
  • Price: FREE
  • File: PDF, 320 page
  • ISBN: 9780748128778
GET EBOOK

'Insightful and ingenious . . . Intrusion is both horrific and comic, and deals movingly with the consequences of genetic fixes' - GUARDIAN 'Intrusion is a finely-tuned, in-your-face argument of a novel . . . MacLeod will push your buttons - and make you think' - SFX Imagine a near-future city, say London, where medical science has advanced beyond our own and a single-dose pill has been developed that, taken when pregnant, eradicates many common genetic defects from an unborn child. Hope Morrison, mother of a hyperactive four-year-old, is expecting her second child. She refuses to take The Fix, as the pill is known. This divides her family and friends and puts her and her husband in danger of imprisonment or worse. Is her decision a private matter of individual choice, or is it tantamount to willful neglect of her unborn child? A plausible and original novel with sinister echoes of 1984 and Brave New World. Books by Ken MacLeod: Fall Revolution The Star Fraction The Stone Canal The Cassini Division The Sky Road Engines of Light Cosmonaut Keep Dark Light Engine City Corporation Wars Trilogy Dissidence Insurgence Emergence Novels The Human Front Newton's Wake Learning the World The Execution Channel The Restoration Game Intrusion Descent

Intrusion Detection and Correlation

Intrusion Detection and Correlation


  • Release: 2005-12-30
  • Publisher: Springer Science & Business Media
  • Price: FREE
  • File: PDF, 118 page
  • ISBN: 9780387233994
GET EBOOK

Details how intrusion detection works in network security with comparisons to traditional methods such as firewalls and cryptography Analyzes the challenges in interpreting and correlating Intrusion Detection alerts