IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
Implementing a Generalized Tool for Network Monitoring: ("Best Paper" Award!)
LISA '97 Proceedings of the 11th USENIX conference on System administration
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
Building intrusion pattern miner for Snort network intrusion detection system
Journal of Systems and Software
Relational network-service clustering analysis with set evidences
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
A multi-objective evolutionary algorithm for network intrusion detection systems
IWANN'11 Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I
MultiAspectForensics: mining large heterogeneous networks using tensor
International Journal of Web Engineering and Technology
SHAPE--an approach for self-healing and self-protection in complex distributed networks
The Journal of Supercomputing
Hi-index | 0.00 |
Computer security has become a major problem in our society. In particular, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users' activity with the aim of distinguishing between hostile and non-hostile traffic. Snort is an IDS available under GPL, which allows pattern search. This paper presents a new anomaly pre-processor that extends the functionality of Snort IDS, making it a hybrid IDS.