Instance-Based Learning Algorithms
Machine Learning
C4.5: programs for machine learning
C4.5: programs for machine learning
NADIR: an automated system for detecting network intrusion and misuse
Computers and Security
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Mining fuzzy association rules in databases
ACM SIGMOD Record
Tripwire: a case study in integrity monitoring
Internet besieged
Intrusion detection with neural networks
NIPS '97 Proceedings of the 1997 conference on Advances in neural information processing systems 10
Intrusion detection using autonomous agents
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Improving intrusion detection performance using keyword selection and neural networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Clustering Algorithms
Classification by Voting Feature Intervals
ECML '97 Proceedings of the 9th European Conference on Machine Learning
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
An Intelligent Decision Support System for Intrusion Detection and Response
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
KDD-99 classifier learning contest LLSoft's results overview
ACM SIGKDD Explorations Newsletter
A Comparative Study of Techniques for Intrusion Detection
ICTAI '03 Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence
Bayesian Event Classification for Intrusion Detection
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Snort 2.1 Intrusion Detection, Second Edition
Snort 2.1 Intrusion Detection, Second Edition
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Unsupervised anomaly detection in network intrusion detection using clusters
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems)
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection
CNSR '07 Proceedings of the Fifth Annual Conference on Communication Networks and Services Research
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
A Comparative Study of Data Mining Algorithms for Network Intrusion Detection
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
Improving malware detection by applying multi-inducer ensemble
Computational Statistics & Data Analysis
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
Artificial Intelligence Review
A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01
Estimating continuous distributions in Bayesian classifiers
UAI'95 Proceedings of the Eleventh conference on Uncertainty in artificial intelligence
Evolutionary neural networks for anomaly detection based on the behavior of a program
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Intrusion detection through learning behavior model
Computer Communications
AI based supervised classifiers: an analysis for intrusion detection
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
An information theoretic approach for feature selection
Security and Communication Networks
Policy-enhanced ANFIS model to counter SOAP-related attacks
Knowledge-Based Systems
The use of artificial-intelligence-based ensembles for intrusion detection: a review
Applied Computational Intelligence and Soft Computing
A Systematic Survey of Self-Protecting Software Systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Hi-index | 0.00 |
The Internet connects hundreds of millions of computers across the world running on multiple hardware and software platforms providing communication and commercial services. However, this interconnectivity among computers also enables malicious users to misuse resources and mount Internet attacks. The continuously growing Internet attacks pose severe challenges to develop a flexible, adaptive security oriented methods. Intrusion detection system (IDS) is one of most important component being used to detect the Internet attacks. In literature, different techniques from various disciplines have been utilized to develop efficient IDS. Artificial intelligence (AI) based techniques plays prominent role in development of IDS and has many benefits over other techniques. However, there is no comprehensive review of AI based techniques to examine and understand the current status of these techniques to solve the intrusion detection problems. In this paper, various AI based techniques have been reviewed focusing on development of IDS. Related studies have been compared by their source of audit data, processing criteria, technique used, dataset, classifier design, feature reduction technique employed and other experimental environment setup. Benefits and limitations of AI based techniques have been discussed. The paper will help the better understanding of different directions in which research has been done in the field of IDS. The findings of this paper provide useful insights into literature and are beneficial for those who are interested in applications of AI based techniques to IDS and related fields. The review also provides the future directions of the research in this area.