Research Article

Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention

Table 1

Comparison of different anomaly-based intrusion detection approaches.

WhatWhoWhereWhenHow

SCLCCFGIRFOSDREAPPSRC/BBINBEDEFSASMLUnML

Feng [6]xxxxx
Jones [7]xxxxx
Ghosh [8]xxxxx
Ko [9]xxxxxx
Hawkins [10]xxxxx
Wagner [11]xxxxx
Our approachxxxxxxxx