Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses and Dissertations

2012

Computer Sciences

Support vector machines

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson Mar 2012

Mfire-2: A Multi Agent System For Flow-Based Intrusion Detection Using Stochastic Search, Timothy J. Wilson

Theses and Dissertations

Detecting attacks targeted against military and commercial computer networks is a crucial element in the domain of cyberwarfare. The traditional method of signature-based intrusion detection is a primary mechanism to alert administrators to malicious activity. However, signature-based methods are not capable of detecting new or novel attacks. This research continues the development of a novel simulated, multiagent, flow-based intrusion detection system called MFIRE. Agents in the network are trained to recognize common attacks, and they share data with other agents to improve the overall effectiveness of the system. A Support Vector Machine (SVM) is the primary classifier with which agents …


Improving Filtering Of Email Phishing Attacks By Using Three-Way Text Classifiers, Alberto Trevino Mar 2012

Improving Filtering Of Email Phishing Attacks By Using Three-Way Text Classifiers, Alberto Trevino

Theses and Dissertations

The Internet has been plagued with endless spam for over 15 years. However, in the last five years spam has morphed from an annoying advertising tool to a social engineering attack vector. Much of today's unwanted email tries to deceive users into replying with passwords, bank account information, or to visit malicious sites which steal login credentials and spread malware. These email-based attacks are known as phishing attacks. Much has been published about these attacks which try to appear real not only to users and subsequently, spam filters. Several sources indicate traditional content filters have a hard time detecting phishing …