Journal ArticleDOI
Review: Intrusion detection system: A comprehensive review
TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.read more
Citations
More filters
Journal ArticleDOI
Swarm Intelligence inspired Intrusion Detection Systems - A systematic literature review
TL;DR: In this article , the authors present a systematic review with a thorough coverage of articles published between 2010 and 2020 of the state-of-the-art swarm intelligence approaches deployed in various attack surfaces for intrusion detection in various domains.
Journal ArticleDOI
An Ensemble of Prediction and Learning Mechanism for Improving Accuracy of Anomaly Detection in Network Intrusion Environments
Imran,Faisal Jamil,Do-Hyeun Kim +2 more
TL;DR: The performance comparison results show that the proposed ensemble model-based intrusion detection significantly improves the intrusion detection accuracy.
Journal ArticleDOI
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges
Geeta Kocher,Gulshan Kumar +1 more
TL;DR: In this article, a systematic review of ML methods and DL methods in intrusion detection is presented, which also focuses on benchmark datasets, performance evaluation measures and various applications of DL methods for intrusion detection.
Proceedings ArticleDOI
Comparative study and analysis of network intrusion detection tools
Dhanashri Bhosale,Vanita Mane +1 more
TL;DR: Study of three popular NIDS tools : Snort, Suricata, Bro.suricata are found, which aims to preserve the availability, confidentiality and Integrity of network and computer.
Journal ArticleDOI
Unsupervised intrusion detection through skip-gram models of network behavior
TL;DR: Skip-gram modeling, a word2vec algorithm variant, was leveraged to model systems’ legitimate network behavior and the resulting model was used to spot intrusions in a test dataset, leading to 99.20% precision, 82.07% recall, and 91.02% accuracy.
References
More filters
Journal ArticleDOI
An Intrusion-Detection Model
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI
Efficient string matching: an aid to bibliographic search
TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI
A fast string searching algorithm
TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i .” in another string, are inspected.
Journal ArticleDOI
Anomaly-based network intrusion detection: Techniques, systems and challenges
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article
A Virtual Machine Introspection Based Architecture for Intrusion Detection.
Tal Garfinkel,Mendel Rosenblum +1 more
TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.