IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A survey of intrusion detection techniques
Computers and Security
Towards a taxonomy of intrusion-detection systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
A fast string searching algorithm
Communications of the ACM
Efficient string matching: an aid to bibliographic search
Communications of the ACM
A Comparative Study of Techniques for Intrusion Detection
ICTAI '03 Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence
A Taxonomy and Catalog of Runtime Software-Fault Monitoring Tools
IEEE Transactions on Software Engineering
HyperSpector: virtual distributed monitoring environments for secure intrusion detection
Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Security and Privacy
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
ICSNC '08 Proceedings of the 2008 Third International Conference on Systems and Networks Communications
Performance evaluation comparison of Snort NIDS under Linux and Windows Server
Journal of Network and Computer Applications
Accurate anomaly detection through parallelism
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
The Application of Virtual Machines on System Security
CHINAGRID '09 Proceedings of the 2009 Fourth ChinaGrid Annual Conference
A survey of network virtualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Handbook of Information and Communication Security
Handbook of Information and Communication Security
A novel intrusion detection system based on hierarchical clustering and support vector machines
Expert Systems with Applications: An International Journal
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Cloud Security: A Comprehensive Guide to Secure Cloud Computing
GrAVity: a massively parallel antivirus engine
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Signaling game based strategy of intrusion detection in wireless sensor networks
Computers & Mathematics with Applications
Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Expert Systems with Applications: An International Journal
String Searching Engine for Virus Scanning
IEEE Transactions on Computers
An Effective Memory Optimization for Virtual Machine-Based Systems
IEEE Transactions on Parallel and Distributed Systems
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
Expert Systems with Applications: An International Journal
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks
IEEE Journal on Selected Areas in Communications
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
The application of genetic algorithm to intrusion detection in MP2P network
ICSI'12 Proceedings of the Third international conference on Advances in Swarm Intelligence - Volume Part I
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Run-time validation of knowledge-based systems
Proceedings of the seventh international conference on Knowledge capture
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
A novel intrusion detection system based on feature generation with visualization strategy
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
With the increasing amount of network throughput and security threat, the study of intrusion detection systems (IDSs) has received a lot of attention throughout the computer science field. Current IDSs pose challenges on not only capricious intrusion categories, but also huge computational power. Though there is a number of existing literatures to IDS issues, we attempt to give a more elaborate image for a comprehensive review. Through the extensive survey and sophisticated organization, we propose the taxonomy to outline modern IDSs. In addition, tables and figures we summarized in the content contribute to easily grasp the overall picture of IDSs.