{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T05:20:03Z","timestamp":1740028803872,"version":"3.37.3"},"reference-count":0,"publisher":"IOS Press","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"abstract":"<jats:p>Detection of unknown attacks in network traffic is gaining increasing importance as modern attacks are characterized by high variabilities and mutation rates. Traditional signature-based intrusion detection systems (IDS) are not able to detect unknown attacks due to failing availability of appropriate signatures. We present an alternative approach based on machine learning techniques which enable automatic construction of profiles for normal packet payloads and detection of deviations thereof. Experimental evaluation of our approach showed a remarkable detection accuracy at low false positive rates and a major improvement in comparison to the widely used open-source IDS Snort.<\/jats:p>","DOI":"10.3233\/978-1-58603-898-4-366","type":"book-chapter","created":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:11:46Z","timestamp":1739992306000},"source":"Crossref","is-referenced-by-count":0,"title":["Machine Learning for Intrusion Detection"],"prefix":"10.3233","author":[{"family":"Laskov Pavel","sequence":"additional","affiliation":[]},{"family":"Rieck Konrad","sequence":"additional","affiliation":[]},{"family":"M&uuml;ller Klaus-Robert","sequence":"additional","affiliation":[]}],"member":"7437","container-title":["NATO Science for Peace and Security Series - D: Information and Communication Security","Mining Massive Data Sets for Security"],"original-title":[],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T19:24:00Z","timestamp":1739993040000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospressISSNISBN&issn=1874-6268&volume=19&spage=366"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"references-count":0,"URL":"https:\/\/doi.org\/10.3233\/978-1-58603-898-4-366","relation":{},"ISSN":["1874-6268"],"issn-type":[{"value":"1874-6268","type":"print"}],"subject":[],"published":{"date-parts":[[2008]]}}}