IEEE Transactions on Pattern Analysis and Machine Intelligence
Swarm intelligence: from natural to artificial systems
Swarm intelligence: from natural to artificial systems
Bro: a system for detecting network intruders in real-time
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving intrusion detection performance using keyword selection and neural networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
The 1999 DARPA off-line intrusion detection evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Practical automated detection of stealthy portscans
Journal of Computer Security
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
SAINT '03 Proceedings of the 2003 Symposium on Applications and the Internet
Learning Rules for Anomaly Detection of Hostile Network Traffic
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Structural analysis of network traffic flows
Proceedings of the joint international conference on Measurement and modeling of computer systems
Diagnosing network-wide traffic anomalies
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Snort - Lightweight Intrusion Detection for Networks
LISA '99 Proceedings of the 13th USENIX conference on System administration
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection
SNPD-SAWN '05 Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
IDEAS: Intrusion Detection based on Emotional Ants for Sensors
ISDA '05 Proceedings of the 5th International Conference on Intelligent Systems Design and Applications
Detecting anomalies in network traffic using maximum entropy estimation
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
IEEE Transactions on Dependable and Secure Computing
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Network anomaly detection with incomplete audit data
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving network security using genetic algorithm approach
Computers and Electrical Engineering
Security aspects in IPv6 networks - implementation and testing
Computers and Electrical Engineering
An Improved Ant-based Classifier for Intrusion Detection
ICNC '07 Proceedings of the Third International Conference on Natural Computation - Volume 04
SS'08 Proceedings of the 17th conference on Security symposium
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
ACM Computing Surveys (CSUR)
Artificial neural network approaches to intrusion detection: a review
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Adaptive Multiagent System for Network Traffic Monitoring
IEEE Intelligent Systems
A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection
CMC '10 Proceedings of the 2010 International Conference on Communications and Mobile Computing - Volume 01
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Detecting network anomalies in backbone networks
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Journal of Network and Computer Applications
Design and analysis of genetic fuzzy systems for intrusion detection in computer networks
Expert Systems with Applications: An International Journal
Distributed denial of service attack detection using an ensemble of neural classifier
Computer Communications
Anomaly detection using ensembles
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
Revisiting traffic anomaly detection using software defined networking
RAID'11 Proceedings of the 14th international conference on Recent Advances in Intrusion Detection
Local area network characteristics, with implications for broadband network congestion management
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems
Journal of Computer and System Sciences
A new dynamic hierarchical reputation evaluation scheme for hybrid wireless mesh networks
Computers and Electrical Engineering
Hi-index | 0.00 |
Automatic network intrusion detection has been an important research topic for the last 20years. In that time, approaches based on signatures describing intrusive behavior have become the de-facto industry standard. Alternatively, other novel techniques have been used for improving automation of the intrusion detection process. In this regard, statistical methods, machine learning and data mining techniques have been proposed arguing higher automation capabilities than signature-based approaches. However, the majority of these novel techniques have never been deployed on real-life scenarios. The fact is that signature-based still is the most widely used strategy for automatic intrusion detection. In the present article we survey the most relevant works in the field of automatic network intrusion detection. In contrast to previous surveys, our analysis considers several features required for truly deploying each one of the reviewed approaches. This wider perspective can help us to identify the possible causes behind the lack of acceptance of novel techniques by network security experts.