Robust Support Vector Machines for Anomaly Detection in Computer Security. Hu, W., Liao, Y., & Vemuri, V R. abstract bibtex Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in terms of high intrusion detection accuracy and low false positives but also in terms of their generalization ability in the presence of noise and running time.
@article{hu_robust_nodate,
title = {Robust {Support} {Vector} {Machines} for {Anomaly} {Detection} in {Computer} {Security}},
abstract = {Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in terms of high intrusion detection accuracy and low false positives but also in terms of their generalization ability in the presence of noise and running time.},
language = {zh-CN},
author = {Hu, Wenjie and Liao, Yihua and Vemuri, V Rao},
}
Downloads: 0
{"_id":"AkTnBZAiCpJKAcumN","bibbaseid":"hu-liao-vemuri-robustsupportvectormachinesforanomalydetectionincomputersecurity","author_short":["Hu, W.","Liao, Y.","Vemuri, V R."],"bibdata":{"bibtype":"article","type":"article","title":"Robust Support Vector Machines for Anomaly Detection in Computer Security","abstract":"Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in terms of high intrusion detection accuracy and low false positives but also in terms of their generalization ability in the presence of noise and running time.","language":"zh-CN","author":[{"propositions":[],"lastnames":["Hu"],"firstnames":["Wenjie"],"suffixes":[]},{"propositions":[],"lastnames":["Liao"],"firstnames":["Yihua"],"suffixes":[]},{"propositions":[],"lastnames":["Vemuri"],"firstnames":["V","Rao"],"suffixes":[]}],"bibtex":"@article{hu_robust_nodate,\n\ttitle = {Robust {Support} {Vector} {Machines} for {Anomaly} {Detection} in {Computer} {Security}},\n\tabstract = {Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared with that of conventional support vector machines and nearest neighbor classifiers in separating normal usage profiles from intrusive profiles of computer programs. The results indicate the superiority of RSVMs not only in terms of high intrusion detection accuracy and low false positives but also in terms of their generalization ability in the presence of noise and running time.},\n\tlanguage = {zh-CN},\n\tauthor = {Hu, Wenjie and Liao, Yihua and Vemuri, V Rao},\n}\n\n","author_short":["Hu, W.","Liao, Y.","Vemuri, V R."],"key":"hu_robust_nodate","id":"hu_robust_nodate","bibbaseid":"hu-liao-vemuri-robustsupportvectormachinesforanomalydetectionincomputersecurity","role":"author","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/zotero/victorjhu","dataSources":["CmHEoydhafhbkXXt5"],"keywords":[],"search_terms":["robust","support","vector","machines","anomaly","detection","computer","security","hu","liao","vemuri"],"title":"Robust Support Vector Machines for Anomaly Detection in Computer Security","year":null}