scispace - formally typeset
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.

read more

Citations
More filters
Proceedings ArticleDOI

Detection of DDOS Attacks in Cloud Computing Environment

TL;DR: The purpose of this paper is to analyze the various detection techniques used and implemented in various cloud environments to counter these types of attacks.
Journal ArticleDOI

Metode Deteksi Intrusi Menggunakan Algoritme Extreme Learning Machine dengan Correlation-based Feature Selection

TL;DR: In this article, the ELM method was used to detect intrusions in the KDD Cup dataset and the accuracy reached 81.97% with a computation time of 3.39 seconds.
Posted Content

Combinatorial Optimization based Feature Selection Method: A study on Network Intrusion Detection

TL;DR: State of the art machine learning algorithms on UNSW-NB15 dataset are applied and a novel wrapper based feature selection technique TS-RF is proposed using metaheuristic Tabu Search (TS) algorithm and Random Forest ensemble classifier to detect new attacks.
Proceedings ArticleDOI

Multiple Attributes Based Spoofing Detection Using an Improved Clustering Algorithm in Mobile Edge Network

TL;DR: The simulation results indicate that the proposed spoofing detection method can provide near-optimal performance with extremely low complexity.
Proceedings ArticleDOI

A Novel SNN-ANN based IDS in Cloud Environment

TL;DR: A hybrid SNN-ANN model is proposed which achieves a high degree of accuracy in identifying and classifying malicious connections on the network into their type of attack using the NSL-KDD dataset.
References
More filters
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Efficient string matching: an aid to bibliographic search

TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI

A fast string searching algorithm

TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i.” in another string, are inspected.
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article

A Virtual Machine Introspection Based Architecture for Intrusion Detection.

TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.
Related Papers (5)