WIDS: a sensor-based online mining wireless intrusion detection system
IDEAS '08 Proceedings of the 2008 international symposium on Database engineering & applications
An Immune Multi-agent System for Network Intrusion Detection
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
Network intrusion detection and classification with decision tree and rule based approaches
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
A neural model in intrusion detection systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Immune multi-agent active defense model for network intrusion
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
Intrusion detection based on MLP neural networks and k-means algorithm
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Journal of Network and Computer Applications
Analyzing and defending against web-based malware
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
Attacks on network infrastructure presently are main threats against network and information security. With rapidly growing unauthorized activities in network, Intrusion Detection (ID) as a component of defense-in-depth is very necessary because traditional firewall techniques cannot provide complete protection against intrusion. ID is an active and important research area of network security. A survey on ID technology is shown in this paper. It is involved with several main aspects of ID technology. Analyses on intrusion detection techniques and data collection techniques are emphasized. Some novel developments in ID Systems, such as both data mining based ID Systems and data fusion based ID Systems, also are discussed. Current ID technology faces some powerful cjallenges, some main challenges and future promising directionsare presented.