A Survey on Anomaly Based Host Intrusion Detection System
暂无分享,去创建一个
D. Malathi | Bharath Reddy | Shijoe Jose | Dorathi Jayaseeli | D. Malathi | B. Reddy | Shijoe Jose | Dorathi Jayaseeli
[1] Kymie M. C. Tan,et al. Determining the operational limits of an anomaly-based intrusion detector , 2003, IEEE J. Sel. Areas Commun..
[2] Xinghuo Yu,et al. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection , 2009, IEEE Network.
[3] Vasilios A. Siris,et al. Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[4] Sumalatha Potteti,et al. Architecture of Hybrid Intrusion Detection System using TAN & GA Algorithm , 2015 .
[5] Lucas M. Venter,et al. A comparison of Intrusion Detection systems , 2001, Comput. Secur..
[6] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[7] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[8] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[9] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[10] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[11] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[12] Shahram Sarkani,et al. A network intrusion detection system based on a Hidden Naïve Bayes multiclass classifier , 2012, Expert Syst. Appl..
[13] اسماء شاكر عاشور الزبيدي. Importance of Intrusion Detection System (IDS) , 2015 .
[14] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[15] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[16] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[17] Vit Bukac,et al. Advances and Challenges in Standalone Host-Based Intrusion Detection Systems , 2012, TrustBus.
[18] David Kaeli,et al. A Framework for Studying New Approaches to Anomaly Detection , 2016 .
[19] V Jyothsna,et al. A Review of Anomaly based Intrusion Detection Systems , 2011 .
[20] A. Qayyum,et al. Taxonomy of statistical based anomaly detection techniques for intrusion detection , 2005, Proceedings of the IEEE Symposium on Emerging Technologies, 2005..
[21] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[22] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[23] M. Sreenath. A Comprehensive Review on Intrusion Detection Systems , 2014 .
[24] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[25] Mojtaba Karami,et al. A Comprehensive Survey on Anomaly-Based Intrusion Detection in MANET , 2012, Comput. Inf. Sci..
[26] Abdelwahab Hamou-Lhadj,et al. A trace abstraction approach for host-based anomaly detection , 2015, 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA).
[27] Jiankun Hu,et al. A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns , 2014, IEEE Transactions on Computers.
[28] K. Pandu Ranga Reddy,et al. Data Mining Machine Learning Techniques - A Study on Abnormal Anomaly Detection System , 2011 .