A Hybrid approach using Signature and Anomaly Detection to detect network Intrusions

[1]  Giovanni Vigna,et al.  NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[2]  Philip K. Chan,et al.  A machine learning approach to detecting attacks by identifying anomalies in network traffic , 2003 .

[3]  Jie Yang,et al.  HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree , 2010, 2010 International Conference on Communications and Mobile Computing.

[4]  Philip K. Chan,et al.  PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .

[5]  Angelos D. Keromytis,et al.  Implementing a distributed firewall , 2000, CCS.

[6]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[7]  J. Chow An Assessment of the DARPA IDS Evaluation Dataset Using Snort S Terry Brugger , 2005 .

[8]  Ulf Lindqvist,et al.  Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[9]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[10]  Kristopher Kendall,et al.  A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .

[11]  Martin Roesch,et al.  Snort - Lightweight Intrusion Detection for Networks , 1999 .

[12]  Ying Chen,et al.  Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes , 2007, IEEE Transactions on Dependable and Secure Computing.

[13]  Henry L. Owen,et al.  The use of Honeynets to detect exploited systems across large enterprise networks , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..

[14]  Yihua Liao,et al.  Machine learning in intrusion detection , 2005 .

[15]  Ian H. Witten,et al.  The WEKA data mining software: an update , 2009, SKDD.

[16]  Fakariah Hani Mohd Ali,et al.  Evaluation effectiveness of hybrid IDS using Snort with Naïve Bayes to detect attacks , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[17]  Philip K. Chan,et al.  Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.

[18]  Consolación Gil,et al.  Design of a Snort-Based Hybrid Intrusion Detection System , 2009, IWANN.

[19]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[20]  Salvatore J. Stolfo,et al.  A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[21]  Valentin Cristea,et al.  Hybrid network Intrusion Detection , 2011, 2011 IEEE 7th International Conference on Intelligent Computer Communication and Processing.

[22]  Jaideep Srivastava,et al.  Intrusion Detection: A Survey , 2005 .

[23]  Koral Ilgun,et al.  USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[24]  A. Halim Zaim,et al.  A hybrid intrusion detection system design for computer network security , 2009, Comput. Electr. Eng..

[25]  Fredrick Mtenzi,et al.  Intrusion Detection Based on Data Mining , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[26]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[27]  Jesus E. Diaz-Verdejo,et al.  A Snort-based approach for the development and deployment of hybrid IDS , 2007, IEEE Latin America Transactions.

[28]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[29]  S Krishnaveni,et al.  A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques , 2011 .

[30]  H. Javitz,et al.  Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .

[31]  Matthew V. Mahoney,et al.  Network traffic anomaly detection based on packet bytes , 2003, SAC '03.

[32]  Philip K. Chan,et al.  An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.

[33]  Mohammad Zulkernine,et al.  Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[34]  H. Gharaee,et al.  A novel hybrid anomaly based intrusion detection method , 2012, 6th International Symposium on Telecommunications (IST).