Management of security in TCP/IP hosts using dedicated monitoring applications
Network control and engineering for Qos, security and mobility II
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
Catching spam before it arrives: domain specific dynamic blacklists
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Analyzing and evaluating dynamics in stide performance for intrusion detection
Knowledge-Based Systems
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
A user-oriented ontology-based approach for network intrusion detection
Computer Standards & Interfaces
Evaluation of Intrusion Detection Systems Under a Resource Constraint
ACM Transactions on Information and System Security (TISSEC)
A Component-Based Framework for Visualization of Intrusion Detection Events
Information Security Journal: A Global Perspective
Choice and Chance: A Conceptual Model of Paths to Information Security Compromise
Information Systems Research
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
A logic-based model to support alert correlation in intrusion detection
Information Fusion
Composing Miners to Develop an Intrusion Detection Solution
Privacy, Security, and Trust in KDD
Information fusion in the immune system
Information Fusion
An adaptive genetic-based signature learning system for intrusion detection
Expert Systems with Applications: An International Journal
A novel method for detecting attacks towards the SIP protocol
SPECTS'09 Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems
Intrusion Detection Using Neural Networks: A Grid Computing Based Data Mining Approach
ICONIP '09 Proceedings of the 16th International Conference on Neural Information Processing: Part II
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
An ontology-based intrusion alerts correlation system
Expert Systems with Applications: An International Journal
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
On detecting active worms with varying scan rate
Computer Communications
Computational intelligence for network intrusion detection: recent contributions
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part I
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Probability principle of a reliable approach to detect signs of DDOS flood attacks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Detection of unknown dos attacks by kolmogorov-complexity fluctuation
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
SAPA: software agents for prevention and auditing of security faults in networked systems
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
An efficient anomaly detection algorithm for vector-based intrusion detection systems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
SPIDER: an autonomic computing approach to database security management
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Are markets for vulnerabilities effective?
MIS Quarterly
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Extreme learning machines for intrusion detection systems
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV
gNIDS: rule-based network intrusion detection system using genetic algorithms
International Journal of Intelligent Systems Technologies and Applications
Hi-index | 4.10 |
The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all, they only identify evidence of intrusions, either while they are in progress or after the fact. The paper considers data collection issues, intrusion detection techniques, system effectiveness and network wide analysis