Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
On Dataset Biases in a Learning System with Minimum A Priori Information for Intrusion Detection
CNSR '04 Proceedings of the Second Annual Conference on Communication Networks and Services Research
Resource-sensitive intrusion detection models for network traffic
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
A parallel decision tree-based method for user authentication based on keystroke patterns
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Accountability and Q-Accountable Logging in Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Choosing Intrusion Detection Systems (IDSs) is difficult owing to the availability of different IDS techniques, the nature of attacks and the inability of IDS techniques to guarantee total security. The use of Intrusion Prevention Systems (IPSs) as a first line of defence does not prevent all attacks, so IDSs are needed as a second line of defence. Anomaly and signature-based techniques are the main approaches employed by IDSs. This new IDS technique is based on two main anomaly detection techniques: statistical and predictive pattern generation techniques. This IDS will detect both known and unknown attacks using signature-based and anomaly techniques.