A survey of intrusion detection techniques
Computers and Security
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
Communications of the ACM
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Learning Program Behavior Profiles for Intrusion Detection
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
NetSTAT: A Network-Based Intrusion Detection Approach
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Intrusion Detection Applying Machine Learning to Solaris Audit Data
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
An immunological approach to change detection: algorithms, analysis and implications
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Service specific anomaly detection for network intrusion detection
Proceedings of the 2002 ACM symposium on Applied computing
Enhancing profiles for anomaly detection using time granularities
Journal of Computer Security
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
ACM SIGKDD Explorations Newsletter
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Anomaly Detection Using Call Stack Information
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Detecting Flaws and Intruders with Visual Data Analysis
IEEE Computer Graphics and Applications
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Decision tree classifier for network intrusion detection with GA-based feature selection
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Factor-analysis based anomaly detection and clustering
Decision Support Systems
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
Network anomaly detection based on TCM-KNN algorithm
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Adaptive anomaly detection with evolving connectionist systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Detecting anomalous records in categorical datasets
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Weighting versus pruning in rule validation for detecting network and host anomalies
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Automatic software interference detection in parallel applications
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
Prevention of information attacks by run-time detection of self-replication in computer codes
Journal of Computer Security
A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
Artificial neural network approaches to intrusion detection: a review
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Mining Frequent Patterns from Network Data Flow
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Anomaly detection inspired by immune network theory: a proposal
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
Electronic Notes in Theoretical Computer Science (ENTCS)
Accurate buffer overflow detection via abstract payload execution
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
TCM-KNN algorithm for supervised network intrusion detection
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A modular multiple classifier system for the detection of intrusions in computer networks
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
A risk-sensitive intrusion detection model
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Use of dimensionality reduction for intrusion detection
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Detecting unusual pattern with labeled data in two-stage
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 1
Intrusion Detection by Ellipsoid Boundary
Journal of Network and Systems Management
Mining frequent patterns from network flows for monitoring network
Expert Systems with Applications: An International Journal
A principal components analysis neural gas algorithm for anomalies clustering
WSEAS TRANSACTIONS on SYSTEMS
An expert system for detecting automobile insurance fraud using social network analysis
Expert Systems with Applications: An International Journal
RFID-based human behavior modeling and anomaly detection for elderly care
Mobile Information Systems
RFID-based human behavior modeling and anomaly detection for elderly care
Mobile Information Systems
Identifying a critical threat to privacy through automatic image classification
Proceedings of the first ACM conference on Data and application security and privacy
Improved realtime intrusion detection system
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
Artificial intelligent firewall
ACAI '11 Proceedings of the International Conference on Advances in Computing and Artificial Intelligence
An anomaly intrusion detection approach using cellular neural networks
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Improved kernel based intrusion detection system
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
A hybrid neural network approach to the classification of novel attacks for intrusion detection
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Machine learning approach to realtime intrusion detection system
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Intrusion detection using PCASOM neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
A novel network intrusion attempts prediction model based on fuzzy neural network
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part I
Two-tier based intrusion detection system
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Learning the daily model of network traffic
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
A survey of security visualization for computer network logs
Security and Communication Networks
Beyond the blacklist: modeling malware spread and the effect of interventions
Proceedings of the 2012 workshop on New security paradigms
Fmeter: extracting indexable low-level system signatures by counting kernel function calls
Proceedings of the 13th International Middleware Conference
Hi-index | 0.00 |
Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight variations of known attacks. This paper describes new process-based intrusion detection approaches that provide the ability to generalize from previously observed behavior to recognize future unseen behavior. The approach employs artificial neural networks (ANNs), and can be used for both anomaly detection in order to detect novel attacks and misuse detection in order to detect known attacks and even variations of known attacks. These techniques were applied to a large corpus of data collected by Lincoln Labs at MIT for an intrusion detection system evaluation sponsored by the U.S. Defense Advanced Research Projects Agency (DARPA). Results from applying these techniques for both anomaly and misuse detection against the DARPA evaluation data are presented.