IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Outlier Detection Using k-Nearest Neighbour Graph
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Not So Naive Bayes: Aggregating One-Dependence Estimators
Machine Learning
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Process Profiling Using Frequencies of System Calls
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Alert Fusion for a Computer Host Based Intrusion Detection System
ECBS '07 Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Non-Stationary Markov Models and Anomaly Propagation Analysis in IDS
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Hierarchical Classifier Combination and Its Application in Networks Intrusion Detection
ICDMW '07 Proceedings of the Seventh IEEE International Conference on Data Mining Workshops
Incorporating soft computing techniques into a probabilistic intrusion detection system
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Journal of Network and Computer Applications
Journal of Network and Computer Applications
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
Journal of Network and Computer Applications
Computational intelligence algorithms analysis for smart grid cyber security
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part II
Policy-enhanced ANFIS model to counter SOAP-related attacks
Knowledge-Based Systems
Inference of network anomaly propagation using spatio-temporal correlation
Journal of Network and Computer Applications
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Hi-index | 0.00 |
In this paper, a hybrid anomaly intrusion detection scheme using program system calls is proposed. In this scheme, a hidden Markov model (HMM) detection engine and a normal database detection engine have been combined to utilise their respective advantages. A fuzzy-based inference mechanism is used to infer a soft boundary between anomalous and normal behaviour, which is otherwise very difficult to determine when they overlap or are very close. To address the challenging issue of high cost in HMM training, an incremental HMM training with optimal initialization of HMM parameters is suggested. Experimental results show that the proposed fuzzy-based detection scheme can reduce false positive alarms by 48%, compared to the single normal database detection scheme. Our HMM incremental training with the optimal initialization produced a significant improvement in terms of training time and storage as well. The HMM training time was reduced by four times and the memory requirement was also reduced significantly.