scispace - formally typeset
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.

read more

Citations
More filters
Journal ArticleDOI

Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review

TL;DR: In this article , the authors present a systematic review with a thorough coverage of articles published between 2010 and 2020 of the state-of-the-art swarm intelligence approaches deployed in various attack surfaces for intrusion detection in various domains.
Journal ArticleDOI

An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments

Imran, +2 more
- 08 Sep 2021 - 
TL;DR: The performance comparison results show that the proposed ensemble model-based intrusion detection significantly improves the intrusion detection accuracy.
Journal ArticleDOI

Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges

TL;DR: In this article, a systematic review of ML methods and DL methods in intrusion detection is presented, which also focuses on benchmark datasets, performance evaluation measures and various applications of DL methods for intrusion detection.
Proceedings ArticleDOI

Comparative study and analysis of network intrusion detection tools

TL;DR: Study of three popular NIDS tools : Snort, Suricata, Bro.suricata are found, which aims to preserve the availability, confidentiality and Integrity of network and computer.
Journal ArticleDOI

Unsupervised intrusion detection through skip-gram models of network behavior

TL;DR: Skip-gram modeling, a word2vec algorithm variant, was leveraged to model systems’ legitimate network behavior and the resulting model was used to spot intrusions in a test dataset, leading to 99.20% precision, 82.07% recall, and 91.02% accuracy.
References
More filters
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Efficient string matching: an aid to bibliographic search

TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI

A fast string searching algorithm

TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i.” in another string, are inspected.
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article

A Virtual Machine Introspection Based Architecture for Intrusion Detection.

TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.
Related Papers (5)