IEEE Transactions on Software Engineering - Special issue on computer security and privacy
NADIR: an automated system for detecting network intrusion and misuse
Computers and Security
Classification and detection of computer intrusions
Classification and detection of computer intrusions
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
Intrusion detection
Implementing a Generalized Tool for Network Monitoring
LISA '97 Proceedings of the 11th Conference on Systems Administration
Experience with EMERALD to Date
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
A Neural Network Component for an Intrusion Detection System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
STAT -- A State Transition Analysis Tool For Intrusion Detection
STAT -- A State Transition Analysis Tool For Intrusion Detection
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Bro: a system for detecting network intruders in real-time
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Application of SVM and ANN for intrusion detection
Computers and Operations Research
A Comprehensive Overview of the Applications of Artificial Life
Artificial Life
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A Tabu Clustering algorithm for Intrusion Detection
Intelligent Data Analysis
A fuzzy-genetic approach to network intrusion detection
Proceedings of the 10th annual conference companion on Genetic and evolutionary computation
Data mining-based intrusion detectors
Expert Systems with Applications: An International Journal
A service-centric model for intrusion detection in next-generation networks
Computer Standards & Interfaces
Combining Feature Selection and Local Modelling in the KDD Cup 99 Dataset
ICANN '09 Proceedings of the 19th International Conference on Artificial Neural Networks: Part I
An efficient network intrusion detection
Computer Communications
An intrusion detection based on support vector machines with a voting weight schema
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Network intrusion detection based on system calls and data mining
Frontiers of Computer Science in China
An anomaly intrusion detection approach using cellular neural networks
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Empirical study on fusion methods using ensemble of RBFNN for network intrusion detection
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Applying fuzzy neural network to intrusion detection based on sequences of system calls
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
An efficient anomaly detection algorithm for vector-based intrusion detection systems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Applying mining fuzzy association rules to intrusion detection based on sequences of system calls
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Detecting anomalous network traffic with combined fuzzy-based approaches
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Behavior-based model of detection and prevention of intrusions in computer networks
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Anomaly intrusion detection based on PLS feature extraction and core vector machine
Knowledge-Based Systems
Journal of Computer Security
Hi-index | 0.25 |
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion detection systems (IDS) offer techniques for modelling and recognising normal and abusive system behaviour. Such methodologies include statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies.