Filters








35,581 Hits in 11.1 sec

Development of an Integrated Solution for Intrusion Detection: A Model Based on Data Correlation

J. Afonso, E. Monteiro, V. Costa
2006 International conference on Networking and Services (ICNS'06)  
This work describes a solution for intrusion detection that presents an improved operational efficacy -both in terms of performance as well as volume of processed data -reducing at the same time the number  ...  As part of the proposed solution the data is collected in a Relational Data base System, to facilitate data correlation, as well as making it available through an easy to use web interface.  ...  new intrusion detection mechanisms from potential attacks that might otherwise be undetected using a solution based on data correlation between different sources.  ... 
doi:10.1109/icns.2006.39 dblp:conf/icns/AfonsoMC06 fatcat:gp3nmyaeurd5xggclq6vr4c7wu

OSCIDS: An Ontology based SCADA Intrusion Detection Framework

Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
This paper presents the design, development, and validation of an ontology based SCADA intrusion detection system.  ...  The proposed system analyses SCADA network communications and can derive additional information based on the background knowledge and ontology models to enhance the intrusion detection data.  ...  ., 2014) presented an anomaly-based intrusion detection system developed for SCADA networks. In their approach, time correlation between different packets is extracted to identify malicious events.  ... 
doi:10.5220/0005969803270335 dblp:conf/secrypt/BalushiMS16 fatcat:cbxqpqjfnra5vdbnul25kngggq

Anomaly-Based Intrusion Detection System [chapter]

Veeramreddy Jyothsna, Koneti Munivara Prasad
2019 Computer and Network Security [Working Title]  
In this work, an attempt is made to develop generic meta-heuristic scale for both known and unknown attacks with a high detection rate and low false alarm rate by adopting efficient feature optimization  ...  Anomaly-based network intrusion detection plays a vital role in protecting networks against malicious activities.  ...  Developing an intrusion detection system independent of the environment is another challenge task for the network anomaly-based intrusion detection system development community [9] [10] [11] [12] [13]  ... 
doi:10.5772/intechopen.82287 fatcat:4mg44z56hzd7rnipeimcdwk54y

Review on Intrusion Detection System Based on The Goal of The Detection System

Mohammad Khaleel Khamees, Faculty of Computer Systems and Software Engineering, University Malaysia Pahang, Mohd Arfian Ismail, Umar Yunan, Shahreen Kasim, Faculty of Computer Systems and Software Engineering, University Malaysia Pahang, School of Industrial Engineering, Telkom University, 40257 Bandung, West Java, Indonesia, Faculty of Computer Science and Information Technology, Universiti Tun Hussein Onn Malaysia, 86400 Parit Raja, Batu Pahat, Johor, Malaysia
2018 International Journal of Integrated Engineering  
An extensive review of the intrusion detection system (IDS) is presented in this paper.  ...  Previous studies review the IDS based on the approaches (algorithms) used or based on the types of the intrusion itself.  ...  Acknowledgement Special thanks to the support of the sponsors from RDU Grant Vot No. RDU180307 form Universiti Malaysia Pahang.  ... 
doi:10.30880/ijie.2018.10.06.028 fatcat:ax2xjb77mvgbhe3sb2l6lwkgja

A Review of Anomaly Detection Techniques for Intrusion Detection

O. Adedibu, Department of Electrical Engineering, The Polytechnic, Ibadan, Nigeria, M.E. Adeshipo
2018 Advances in Multidisciplinary & Scientific Research Journal Publication  
This paper discusses anormaly detection techniques utilized for developing intrusion detection systems and provides a general background in terms of literature thus serving as a reference material for  ...  There are a number of common attacks on networked computers which, for their detection, require information from multiple sources, increased network connectivity of computer systems gives greater access  ...  The important component of the proposed research is to analyze the computational aspects of the LAN network and integrate them in a single framework in order to develop a simple intrusion/anomaly detection  ... 
doi:10.22624/aims/digital/v6n4p1 fatcat:2rsvb4yxdng2xgzcpmxyttjjmu

Classification of KDDCup99 Dataset for Intrusion Detection: A Survey

2017 International Journal of Recent Trends in Engineering and Research  
Although there are various algorithms implemented for the detection of intrusions, but the classification of these intrusion is also an important concern since the type of attack depends on the intrusion  ...  Here in this paper a survey of all the Intrusion Detections technique used for the classification of KDDCup99 Datasets.  ...  security defense is built on the integration of data stream mining and intrusion detection; and, a data stream clustering algorithm is designed for mining in the model.  ... 
doi:10.23883/ijrter.2017.3327.eds6q fatcat:qptogod7czanffi64fwlpiitj4

Analysis of Intrusion Detection Systems in Industrial Ecosystems

Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier Lopez
2017 Proceedings of the 14th International Joint Conference on e-Business and Telecommunications  
For an effective protection of all the elements of an industrial ecosystem against threats, it is necessary to understand the true scope of existing mechanisms capable of detecting potential anomalies  ...  and intrusions.  ...  Context-based solutions One drawback of most products based on the detection of attack signatures and patterns is the lack of correlation between the detected events, which could provide valuable information  ... 
doi:10.5220/0006426301160128 dblp:conf/secrypt/RubioARL17 fatcat:qj7iaepf7ffdfparlncgcydc4m

Integrated Intrusion Detection Approach for Cloud Computing

C. Ambikavathi, S. K. Srivatsa
2016 Indian Journal of Science and Technology  
Objectives: Intrusion Detection System (IDS) models and methods are integrated for better detection of intruders and mitigation of false alarms.  ...  Intrusion specific data classification and false alarms degrades performance. This integrated model integrates both IDS models and IDS methodologies.  ...  Cloud traffic aggregation and data classification are the key points of developing an IDS appropriate for the cloud computing model.  ... 
doi:10.17485/ijst/2016/v9i22/95170 fatcat:3eh655jbtragvlfqclpk2dkf2i

Experimental Cyber Attack Detection Framework

Cătălin Mironeanu, Alexandru Archip, Cristian-Mihai Amarandei, Mitică Craus
2021 Electronics  
We submit a novel concept for integrating machine learning and analytical tools into a live intrusion detection and prevention solution.  ...  Digital security plays an ever-increasing, crucial role in today's information-based society.  ...  Acknowledgments: We are very grateful to Alexandru Coman from Yonder's Cybersecurity and Security Awareness division https://tss-yonder.com/solutions/cyber-threat-aware/ (accessed on 13 July 2021). for  ... 
doi:10.3390/electronics10141682 fatcat:h4tpj4ihkvfanhn6fpmwkjwqjy

Hybrid Intelligent Intrusion Detection System

Norbik Bashah, Idris Bharanidharan Shanmugam, Abdul Manan Ahmed
2007 Zenodo  
Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection.  ...  For host based intrusion detection we use neural-networks along with self organizing maps.  ...  The wide spread use of e-commerce, has increased the necessity of protecting the system to a very high extend. Intrusion detection has become an integral part of the information security process.  ... 
doi:10.5281/zenodo.1061257 fatcat:rryehjccwfbsvckml57bsvdtay

Towards an Integrated Intrusion Detection Monitoring in High Speed Networks

Sallay
2011 Journal of Computer Science  
Several scenarios of Snort IDS showed an improvement on the performance of real-time detection. An integration of a set of tools provided a convivial IDS monitoring platform.  ...  Differentiating these two facets, leads to the design of a scalable intrusion detection management solution.  ...  ACKNOWLEDGMENT This study is a partial result of a project funded by King Abdul Aziz City for Sciences and Technologies (KACST) in the security research track.  ... 
doi:10.3844/jcssp.2011.1094.1104 fatcat:expbc6toyvb2lnuzmyl5im5dqq

Intrusion Detection System using Traffic Prediction Model

Amita A.Patil, S. R. Patil
2014 International Journal of Computer Applications  
In this paper, an intrusion detection system is proposed for wireless network. The result shows an effective intrusion detection system which will effectively detect the intrusion attacks.  ...  Therefore, the detection of intrusion attacks in wireless networks is challenging security issues. The various types of attacks can be detected by using various methods.  ...  Min Wei and Keecheon Kim [1] proposed an intrusion detection system based on traffic prediction. For traffic prediction they used the ARMA model.  ... 
doi:10.5120/17323-7811 fatcat:2qlrfzknjfbrdeea2pkpfcod3q

Multisensor Agent Based Intrusion Detection

Richard A. Wasniowski
2007 Zenodo  
In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System.  ...  Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation.  ...  We are developing a series of analytic and simulation models to addressed this problem and assess the potential benefits of distributed sensor based intrusion detecting systems for reducing false alarms  ... 
doi:10.5281/zenodo.1058091 fatcat:2aels2aesff4dikbryyseuehni

Intrusion Detection using Hidden Markov Model

Sanjay KumarSharma, Manish Manoria
2015 International Journal of Computer Applications  
Cloud computing is a new and emerging information technology that changes the way of IT architectural solutions and put forward by means of moving towards the theme of virtualization of data storage, local  ...  In this paper, different intrusion detection and prevention techniques are studies which affect availability, confidentiality and integrity of Cloud resources and services.  ...  CONCLUSION AND FUTURE SCOPE We can make efficient intrusion detection system by combining expert neural network algorithm and hidden markov model for efficient intrusion detection based on structure of  ... 
doi:10.5120/20142-2264 fatcat:7yye4yboena2xkazskdifjuzv4

Immunological Approach for Intrusion Detection

Meriem Zekri, Labiba Souici-Meslati
2014 ARIMA  
In this paper, we propose two artificial immune systems for intrusion detection using the KDD Cup'99 database.  ...  For decades, developers have protected their systems using classical methods.  ...  Intrusion detection is one of those solutions that detect intrusion of unwanted users.  ... 
doi:10.46298/arima.1974 fatcat:wv434lykgjasrn5pgreyimreg4
« Previous Showing results 1 — 15 out of 35,581 results