scispace - formally typeset
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.

read more

Citations
More filters
Dissertation

Advanced Threat Intelligence: Interpretation of Anomalous Behavior in Ubiquitous Kernel Processes

Robert Luh
TL;DR: The financial support by the Christian Doppler Research Association, the Austrian Federal Ministry for Digital and Economic Affairs, and the National Foundation for Research, Technology and Development is gratefully acknowledged.
Journal ArticleDOI

Analysis of Machine Learning Techniques for Anomaly-Based Intrusion Detection

TL;DR: The experiment results showed that random forest and decision tree classifiers are effective for detecting intrusion and naïve Bayes was observed to be potent in classifying backdoor attacks.
Journal ArticleDOI

Optimality of a Network Monitoring Agent and Validation in a Real Probe

TL;DR: In this article , a three-dimensional Markov decision process is proposed to determine the position of the server in each time slot so as to optimize the system performance which is measured in terms of throughput.
Journal ArticleDOI

Hybrid intrusion detection system using fuzzy logic inference engine for sql injection attack

TL;DR: Proposed hybrid IDS for web applications from SQL injection-based attacks is based on hybrid architecture with a signature-based detection method, type of data to analyzed is network packet and error log and fuzzy logic inference engine used to be drawn the conclusion based on analyzed data.
Book ChapterDOI

Execution Improvement of Intrusion Detection System Through Dimensionality Reduction for UNSW-NB15 Information

TL;DR: In this article, IDSs are assembled utilizing machine learning (ML) methods and results affirmed the adequacy of the proposed feature determination strategy in improving organization IDS.
References
More filters
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Efficient string matching: an aid to bibliographic search

TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI

A fast string searching algorithm

TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i.” in another string, are inspected.
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article

A Virtual Machine Introspection Based Architecture for Intrusion Detection.

TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.
Related Papers (5)