Research Article
Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention
Table 1
Comparison of different anomaly-based intrusion detection approaches.
| | What | Who | Where | When | How |
| | SC | LC | CFG | IRF | OS | DRE | APP | SRC/B | BIN | BE | DE | FSA | SML | UnML |
| Feng [6] | | | x | | x | | | | x | | x | x | | | Jones [7] | | x | | | | | x | | x | | x | x | | | Ghosh [8] | | | | | x | | | | x | | x | x | x | | Ko [9] | x | | | | x | | | | x | | x | x | x | | Hawkins [10] | | | x | | | x | | | x | | x | x | | | Wagner [11] | x | | | x | | | | x | | x | | x | | | Our approach | x | x | x | x | | | x | x | | | x | | | x |
|
|