The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks.Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and wireless networks and agent-based intrusion surveillance, detection, and prevention. The book contains 19 chapters written by experts from 12 different countries that provide a truly global perspective.The text begins by examining traffic analysis and management for intrusion detection systems. It explores honeypots, honeynets, network traffic analysis, and the basics of outlier detection. It talks about different kinds of IDSs for different infrastructures and considers new and emerging technologies such as smart grids, cyber physical systems, cloud computing, and hardware techniques for high performance intrusion detection.The book covers artificial intelligence-related intrusion detection techniques and explores intrusion tackling mechanisms for various wireless systems and networks, including wireless sensor networks, WiFi, and wireless automation systems. Containing some chapters written in a tutorial style, this book is an ideal reference for graduate students, professionals, and researchers working in the field of computer and network security.

[1]  Ali A. Ghorbani,et al.  Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.

[2]  Ece Guran Schmidt,et al.  Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison , 2010, Perform. Evaluation.

[3]  Brent Waters,et al.  New Techniques for Private Stream Searching , 2009, TSEC.

[4]  Wenke Lee,et al.  Integrating intrusion detection and network management , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[5]  Milos Manic,et al.  Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.

[6]  Zhang Jun,et al.  MADIDS: a novel distributed IDS based on mobile agent , 2003 .

[7]  C.-C. Jay Kuo,et al.  Distributed spatio-temporal outlier detection in sensor networks , 2005, SPIE Defense + Commercial Sensing.

[8]  Dharma P. Agrawal,et al.  SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[9]  Lior Rokach,et al.  Troika - An improved stacking schema for classification tasks , 2009, Inf. Sci..

[10]  Kian Meng Yap,et al.  The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system , 2012, ICWCA.

[11]  Yan Zhang,et al.  The Design and Implementation of Host-Based Intrusion Detection System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[12]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[13]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[14]  A. Marshall,et al.  Design and Analysis of an Independent, Layer 2, Open-Access WiFi Monitoring Infrastructure in the Wild , 2012, ICWN 2012.

[15]  Peter Stone,et al.  Reinforcement Learning for RoboCup Soccer Keepaway , 2005, Adapt. Behav..

[16]  Daihee Park,et al.  Traffic flooding attack detection with SNMP MIB using SVM , 2008, Comput. Commun..

[17]  Salvatore J. Stolfo,et al.  A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions , 2000, Recent Advances in Intrusion Detection.

[18]  Dayu Yang,et al.  Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .

[19]  Peng Ning,et al.  Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.

[20]  Charles L. A. Clarke,et al.  Relevance ranking for one to three term queries , 1997, Inf. Process. Manag..

[21]  Do-hyeon Lee,et al.  Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[22]  C. Lu A Uniied Approach to Spatial Outliers Detection , 2003 .

[23]  David W. Aha,et al.  Instance-Based Learning Algorithms , 1991, Machine Learning.

[24]  Vijay Varadharajan,et al.  Intrusion Detection Techniques for Infrastructure as a Service Cloud , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[25]  Lam-for Kwok,et al.  Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction , 2012, CSS.

[26]  Bill Cheswick,et al.  Privacy-Enhanced Searches Using Encrypted Bloom Filters , 2004, IACR Cryptol. ePrint Arch..

[27]  Giovanni Vigna Mobile agents: ten reasons for failure , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[28]  Christopher Krügel,et al.  Anomalous system call detection , 2006, TSEC.

[29]  Ming Li,et al.  Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[30]  Mansour Sheikhan,et al.  Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.

[31]  M. Bellare,et al.  Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.

[32]  Aiko M. Hormann,et al.  Programs for Machine Learning. Part I , 1962, Inf. Control..

[33]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[34]  Peyman Kabiri,et al.  Category-Based Selection of Effective Parameters for Intrusion Detection , 2009 .

[35]  Guanlin Chen,et al.  An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition , 2010, 2010 Second International Conference on Future Networks.

[36]  Aidong Zhang,et al.  FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.

[37]  Steven Furnell,et al.  A new taxonomy for comparing intrusion detection systems , 2007, Internet Res..

[38]  Guisong Liu,et al.  An integrated intrusion detection system by using multiple neural networks , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.

[39]  Robert C. Holte,et al.  Very Simple Classification Rules Perform Well on Most Commonly Used Datasets , 1993, Machine Learning.

[40]  P. Brockett,et al.  Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .

[41]  Emin Anarim,et al.  An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..

[42]  Gulshan Kumar,et al.  The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review , 2012, Appl. Comput. Intell. Soft Comput..

[43]  Mark Stamp,et al.  Masquerade detection using profile hidden Markov models , 2011, Comput. Secur..

[44]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[45]  Johnny S. Wong,et al.  On Evaluation of Response Cost for Intrusion Response Systems , 2008, RAID.

[46]  Anthony K. H. Tung,et al.  Mining top-n local outliers in large databases , 2001, KDD '01.

[47]  Gregory White,et al.  A Taxonomy of Cyber Events Affecting Communities , 2011, 2011 44th Hawaii International Conference on System Sciences.

[48]  Vasant Honavar,et al.  Lightweight agents for intrusion detection , 2003, J. Syst. Softw..

[49]  Hua Song,et al.  Real-time intrusion detection for high-speed networks , 2005, Comput. Secur..

[50]  Salvatore D'Antonio,et al.  High-Speed Intrusion Detection in Support of Critical Infrastructure Protection , 2006, CRITIS.

[51]  Nur Izura Udzir,et al.  A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection , 2011 .

[52]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[53]  Ray Hunt,et al.  Intrusion detection techniques and approaches , 2002, Comput. Commun..

[54]  Ali Ghorbani,et al.  Alert correlation survey: framework and techniques , 2006, PST.

[55]  Evangelos P. Markatos,et al.  An active splitter architecture for intrusion detection and prevention , 2006, IEEE Transactions on Dependable and Secure Computing.

[56]  Wei Lu,et al.  An unsupervised approach for detecting DDOS attacks based on traffic-based metrics , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..

[57]  Jung-Taek Seo,et al.  SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing , 2005, GCC.

[58]  Xinjian Qiang,et al.  A survey of some classic self-organizing maps with incremental learning , 2010, 2010 2nd International Conference on Signal Processing Systems.

[59]  Viktor K. Prasanna,et al.  Fast Regular Expression Matching Using FPGAs , 2001, The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'01).

[60]  Chunlei Wang,et al.  A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.

[61]  Wu Yang,et al.  Intrusion detection system for high-speed network , 2004, Comput. Commun..

[62]  AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks , 2010, 2010 10th International Conference on Hybrid Intelligent Systems.

[63]  Daniel Kudenko,et al.  Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.

[64]  Lambert Schaelicke,et al.  SPANIDS: a scalable network intrusion detection loadbalancer , 2005, CF '05.

[65]  Deborah A. Frincke,et al.  Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.

[66]  Hans-Peter Kriegel,et al.  LoOP: local outlier probabilities , 2009, CIKM.

[67]  Qishi Wu,et al.  AVOIDIT: A Cyber Attack Taxonomy , 2009 .

[68]  Dwen-Ren Tsai,et al.  A hybrid intelligent intrusion detection system to recognize novel attacks , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[69]  Xin Xu,et al.  A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.

[70]  Atsushi Inoue,et al.  Collaborative intrusion detection system , 2003, 22nd International Conference of the North American Fuzzy Information Processing Society, NAFIPS 2003.

[71]  Sugata Sanyal,et al.  Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[72]  Joonsang Baek,et al.  Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.

[73]  Peng Ning,et al.  Learning attack strategies from intrusion alerts , 2003, CCS '03.

[74]  Christopher R. Clark,et al.  Scalable pattern matching for high speed networks , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.

[75]  Bhupendra Verma,et al.  Implementation of network traffic classifier using semi supervised machine learning approach , 2012, 2012 Nirma University International Conference on Engineering (NUiCONE).

[76]  M. F. Augusteijn,et al.  Neural network classification and novelty detection , 2002 .

[77]  Shi-Jinn Horng,et al.  A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..

[78]  William Perrizo,et al.  A vertical outlier detection algorithm with clusters as by-product , 2004, 16th IEEE International Conference on Tools with Artificial Intelligence.

[79]  Christos Faloutsos,et al.  LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[80]  Mikhail J. Atallah,et al.  Better Logging through Formality , 2000, Recent Advances in Intrusion Detection.

[81]  Joemon M. Jose,et al.  A Comparative Study of the Effectiveness of Search Result Presentation on the Web , 2006, ECIR.

[82]  Michaël Rusinowitch,et al.  Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[83]  Li Yang,et al.  Alerts Analysis and Visualization in Network-based Intrusion Detection Systems , 2010, 2010 IEEE Second International Conference on Social Computing.

[84]  Uwe Aickelin,et al.  Adaptive Alert Throttling for Intrusion Detection Systems , 2013, ArXiv.

[85]  Álvaro Herrero,et al.  Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..

[86]  Pieter H. Hartel,et al.  Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.

[87]  Li Zhang,et al.  Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[88]  Alexander Zien,et al.  Semi-Supervised Classification by Low Density Separation , 2005, AISTATS.

[89]  Ali A. Ghorbani,et al.  Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).

[90]  Ali A. Ghorbani,et al.  Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..

[91]  Sung-Bae Cho,et al.  Efficient anomaly detection by modeling privilege flows using hidden Markov model , 2003, Comput. Secur..

[92]  S. Chintabathina,et al.  Plan recognition in intrusion detection systems using logic programming , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).

[93]  Ajith Abraham,et al.  Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..

[94]  Aiko Pras,et al.  A Labeled Data Set for Flow-Based Intrusion Detection , 2009, IPOM.

[95]  Dharanipragada Janakiram,et al.  Outlier Detection in Sensor Networks using Bayesian Belief Networks , 2006 .

[96]  Robert McNaughton,et al.  Regular Expressions and State Graphs for Automata , 1960, IRE Trans. Electron. Comput..

[97]  Jason Smith,et al.  Specification-Based Intrusion Detection in WLANs , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[98]  Eamonn J. Keogh,et al.  Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).

[99]  Shay Artzi,et al.  Encrypted Keyword Search in a Distributed Storage System , 2006 .

[100]  Philipp Winter,et al.  Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.

[101]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[102]  Nasser Ghadiri,et al.  An Adaptive Hybrid Architecture for Intrusion Detection Based on Fuzzy Clustering and RBF Neural Networks , 2011, 2011 Ninth Annual Communication Networks and Services Research Conference.

[103]  Laxmi N. Bhuyan,et al.  Compiling PCRE to FPGA for accelerating SNORT IDS , 2007, ANCS '07.

[104]  Chris Horn,et al.  Visual analysis of goal-directed network defense decisions , 2011, VizSec '11.

[105]  P. Sajda,et al.  Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).

[106]  Ravi Jain,et al.  D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..

[107]  Ray Hunt,et al.  A taxonomy of network and computer attacks , 2005, Comput. Secur..

[108]  Kang G. Shin,et al.  Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.

[109]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[110]  Viktor K. Prasanna,et al.  Compact architecture for high-throughput regular expression matching on FPGA , 2008, ANCS '08.

[111]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[112]  Christopher Krügel,et al.  A Parallel Architecture for Stateful, High-Speed Intrusion Detection , 2008, ICISS.

[113]  Wei Hu,et al.  Unsupervised Active Learning Based on Hierarchical Graph-Theoretic Clustering , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[114]  Marina Thottan,et al.  Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..

[115]  Bo Zhang,et al.  An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..

[116]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[117]  Carlos Soares,et al.  Outlier Detection using Clustering Methods: a data cleaning application , 2004 .

[118]  Keith A Gehrke The Unexplored Impact of IPv6 on Intrusion Detection Systems , 2012 .

[119]  Alexandros G. Fragkiadakis,et al.  Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..

[120]  Martti Juhola,et al.  Informal identification of outliers in medical data , 2000 .

[121]  H. Hotelling A Generalized T Test and Measure of Multivariate Dispersion , 1951 .

[122]  Zengyou He,et al.  Outlier Detection Integrating Semantic Knowledge , 2002, WAIM.

[123]  Christopher Krügel,et al.  Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[124]  Jr. D W Straub,et al.  Deviancy by bits and bytes: computer abusers and control measures , 1984 .

[125]  Ahmed Patel,et al.  An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..

[126]  Alfonso Valdes,et al.  A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.

[127]  Ali A. Ghorbani,et al.  Alert Correlation for Extracting Attack Strategies , 2006, Int. J. Netw. Secur..

[128]  Stamatis Vassiliadis,et al.  Regular expression matching for reconfigurable packet inspection , 2006, 2006 IEEE International Conference on Field Programmable Technology.

[129]  Salim Hariri,et al.  Abnormality metrics to detect and protect against network attacks , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..

[130]  Patrick Crowley,et al.  Algorithms to accelerate multiple regular expressions matching for deep packet inspection , 2006, SIGCOMM 2006.

[131]  Jonathan Katz,et al.  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.

[132]  Zengyou He,et al.  Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..

[133]  Xin Xu,et al.  Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.

[134]  Norio Yamagaki,et al.  High-speed regular expression matching engine using multi-character NFA , 2008, 2008 International Conference on Field Programmable Logic and Applications.

[135]  Moh'd Belal Al-Zoubi,et al.  New outlier detection method based on fuzzy clustering , 2010 .

[136]  Khalil El-Khatib,et al.  Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[137]  Eugene H. Spafford,et al.  Intrusion detection using autonomous agents , 2000, Comput. Networks.

[138]  K. Kadota,et al.  Detecting outlying samples in microarray data: A critical assessment of the effect of outliers on sample classification , 2003 .

[139]  Julien Bourgeois,et al.  Protecting grids from cross-domain attacks using security alert sharing mechanisms , 2013, Future Gener. Comput. Syst..

[140]  Zbigniew Kotulski,et al.  Analysis of different architectures of neural networks for application in Intrusion Detection Systems , 2008, 2008 International Multiconference on Computer Science and Information Technology.

[141]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[142]  Johnny S. Wong,et al.  On the symbiosis of specification-based and anomaly-based detection , 2010, Comput. Secur..

[143]  Elaine Shi,et al.  Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..

[144]  Sandeep Kumar,et al.  Classification and detection of computer intrusions , 1996 .

[145]  Bin Li,et al.  A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[146]  Ke Zhang,et al.  A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data , 2009, PAKDD.

[147]  Tal Malkin,et al.  Secure anonymous database search , 2009, CCSW '09.

[148]  George Varghese,et al.  Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.

[149]  Michel Cukier,et al.  Evaluating Attack Resiliency for Host Intrusion Detection Systems , 2009 .

[150]  Robert K. Cunningham,et al.  Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.

[151]  Kymie M. C. Tan,et al.  A defense-centric taxonomy based on attack manifestations , 2004, International Conference on Dependable Systems and Networks, 2004.

[152]  H. Altay Güvenir,et al.  Classification by Voting Feature Intervals , 1997, ECML.

[153]  Morteza Amini,et al.  RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..

[154]  Oded Goldreich,et al.  Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.

[155]  Haimonti Dutta,et al.  Distributed Top-K Outlier Detection from Astronomy Catalogs using the DEMAC System , 2007, SDM.

[156]  Slavi ˘ Sarafijanovicand An Artificial Immune System Approach With Secondary Response for Misbehavior Detection in Mobile ad hoc Networks , 2005 .

[157]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[158]  Brent Waters,et al.  Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.

[159]  Riyad Alshammari,et al.  Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[160]  Angelos D. Keromytis,et al.  SSARES: Secure Searchable Automated Remote Email Storage , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).

[161]  Yan Gao,et al.  A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[162]  N. Elz,et al.  Anomaly detection using new MIB traffic parameters based on profile , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).

[163]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[164]  D. L. Lough,et al.  A taxonomy of computer attacks with applications to wireless networks , 2001 .

[165]  Minjie Zhang,et al.  P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).

[166]  Viktor K. Prasanna,et al.  High-Performance and Compact Architecture for Regular Expression Matching on FPGA , 2012, IEEE Transactions on Computers.

[167]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[168]  Salim Hariri,et al.  A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.

[169]  H. Bergman,et al.  Information processing, dimensionality reduction and reinforcement learning in the basal ganglia , 2003, Progress in Neurobiology.

[170]  Leon Reznik,et al.  Traffic Analysis Based Identification of Attacks , 2008, Int. J. Comput. Sci. Appl..

[171]  Wei Gao,et al.  On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.

[172]  Geoffrey M. Voelker,et al.  Usage Patterns in an Urban WiFi Network , 2010, IEEE/ACM Transactions on Networking.

[173]  Pat Langley,et al.  Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.

[174]  Tsuhan Chen,et al.  Semi-supervised co-training and active learning based approach for multi-view intrusion detection , 2009, SAC '09.

[175]  M. Zolghadri Jahromi,et al.  A cost sensitive learning algorithm for intrusion detection , 2010, 2010 18th Iranian Conference on Electrical Engineering.

[176]  Jian Ma,et al.  A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..

[177]  Eugene H. Spafford,et al.  A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .

[178]  Dipankar Dasgupta,et al.  A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[179]  Mohamed S. Kamel,et al.  RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[180]  Robert P. Goldman,et al.  Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[181]  Craig Valli SCADA Forensics with Snort IDS , 2009 .

[182]  Cong Wang,et al.  Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.

[183]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[184]  P. Vishvapathi,et al.  Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .

[185]  David S. Rosenblum,et al.  Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures , 2006, 2006 Securecomm and Workshops.

[186]  Mudhakar Srivatsa,et al.  Securing publish-subscribe overlay services with EventGuard , 2005, CCS '05.

[187]  Christopher Krügel,et al.  Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.

[188]  Reyadh Shaker Naoum,et al.  Learning Vector Quantization ( LVQ ) and k-Nearest Neighbor for Intrusion Classification , 2012 .

[189]  Paul A. Crook,et al.  A Robot Implementation of a Biologically Inspired Method for Novelty Detection , 2002 .

[190]  Sureswaran Ramadass,et al.  Architecture for Applying Data Mining and Visualization on Network Flow for Botnet Traffic Detection , 2009, 2009 International Conference on Computer Technology and Development.