Filters








23,544 Hits in 8.2 sec

Specification-based anomaly detection

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
This paper presents a new approach that combines specification-based and anomaly-based intrusion detection, mitigating the weaknesses of the two approaches while magnifying their strengths.  ...  Specification-based techniques have been shown to produce a low rate of false alarms, but are not as effective as anomaly detection in detecting novel attacks, especially when it comes to network probing  ...  CONCLUSIONS In this paper, we presented a new approach for network intrusion detection called specification-based anomaly detection.  ... 
doi:10.1145/586110.586146 dblp:conf/ccs/SekarGFSTYZ02 fatcat:24msghrcn5dptnnzvvo5du76ba

Specification-based anomaly detection

R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
This paper presents a new approach that combines specification-based and anomaly-based intrusion detection, mitigating the weaknesses of the two approaches while magnifying their strengths.  ...  Specification-based techniques have been shown to produce a low rate of false alarms, but are not as effective as anomaly detection in detecting novel attacks, especially when it comes to network probing  ...  CONCLUSIONS In this paper, we presented a new approach for network intrusion detection called specification-based anomaly detection.  ... 
doi:10.1145/586143.586146 fatcat:etku2dshrbbenauk3mtunisyee

A New Approach to Artificial Immune System for Intrusion Detection of the Mobile Ad Hoc Networks

Anass Khannous, Anass Rghioui, Fatiha Elouaai, Mohammed Bouhorma
2014 International Journal of Computer Applications  
The use of artificial immune systems (AIS) in intrusion detection is an attractive concept for several reasons.  ...  Then it is judicious to expect that approaches of biological inspirations in this area, and specifically the abstraction of immune defense mechanism with its high detection capabilities and its strong  ...  PROPOSITION OF A NEW APPROACH BASED ON THE DANGER THEORY 5.1 The proposed approach objectives The goal is to build an IDS in order to reduce the error rate represented by the false positive rate.  ... 
doi:10.5120/16088-5401 fatcat:vpy4443wzva4bpaj46vudokf2u

A New Energy Prediction Approach for Intrusion Detection in Cluster-Based Wireless Sensor Networks [chapter]

Wen Shen, Guangjie Han, Lei Shu, Joel J. P. C. Rodrigues, Naveen Chilamkurti
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In this paper, we propose a novel intrusion detection scheme based on the energy prediction in cluster-based WSNs (EPIDS).  ...  Wireless Sensor Networks (WSNs) require an efficient intrusion detection scheme to identify malicious attackers.  ...  These two specific features mentioned above collectively make EPIDS a new, lightweight and efficient solution that can detect various attacks applied in any cluster-based WSNs.  ... 
doi:10.1007/978-3-642-33368-2_1 fatcat:wex4pfbntncuxgd57qf5l6b5dm

A New Multi-threaded and Interleaving Approach to Enhance String Matching for Intrusion Detection Systems

Ali M. Shatnawi, Bushra AlHajouj, Moath Jarrah
2018 International Journal of Communication Networks and Information Security  
String matching algorithms are important for network security, biomedical applications, Web search, and social networks.  ...  In this paper, a new multi-threaded and interleaving approach of Aho-Corasick using graphics processing units (GPUs) is designed and implemented to achieve high-speed string matching.  ...  Vol. 10, No. 2, August 2018 patterns from snort and network traffic in conducting our experiments.  ... 
dblp:journals/ijcnis/ShatnawiAJ18 fatcat:d2tzcybitfcozmeh2krop6qwwu

On the symbiosis of specification-based and anomaly-based detection

Natalia Stakhanova, Samik Basu, Johnny Wong
2010 Computers & security  
In this work, we present an approach for automatic generation of specifications for any software systems executing on a single host based on the combination of two techniques: specification-based and anomaly-based  ...  Program behavior specification Network monitoring Intrusion detection a b s t r a c t As the number of attacks on computer systems increases and become more sophisticated, there is an obvious need for  ...  There are three broad categories of detection approaches (Sekar et al., 2002 ) (a) misuse-based (b) anomaly-based and (c) specification-based.  ... 
doi:10.1016/j.cose.2009.08.007 fatcat:vn37ymc5zzcetjwdqktbo4ncru

Anomaly-Based Web Application Firewall Using Http-Specific Features And One-Class Svm

Nico Epp, Ralf Funk, Cristian Cappo
2018 Zenodo  
In this paper, we present such a firewall based on anomaly detection that aims to detect anomalous HTTP requests using One-Class SVM classifier.  ...  We include a link to the online repository that contains the code of our implementation for the purpose of re- producibility and extensibility.  ...  The work in [Rieck 2009 ] proposed a network intrusion detector using a kind of One-Class SVM with RBF kernel to detect anomalies in HTTP and FTP traffic.  ... 
doi:10.5281/zenodo.1336811 fatcat:5h66u2fq5bfmjfc5w2qrgpmx5q

Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach

Dr Jabez Jones
2018 Figshare  
An Intrusion Detection System (IDS) is a software application or device that monitors the systemor activities of network for policy violations or malicious activities and generates reports to themanagement  ...  Various methods can be used to detect intrusions but each one isspecific to a specific method. The main goal of an intrusion detection system is to detect theattacks efficiently.  ...  Conclusion In this paper, we have presented the details of a new approach called Outlier Detection approach to detect the intrusion in the computer network.  ... 
doi:10.6084/m9.figshare.6455036.v1 fatcat:izsokdrvsvfezn436suepbe2hi

Anomaly Detection Based Intrusion Detection

D. Novikov, R.V. Yampolskiy, L. Reznik
2006 Third International Conference on Information Technology: New Generations (ITNG'06)  
This work is devoted to the problem of Neural Networks as means of Intrusion Detection.  ...  The advantage of the taken approach allows us to demonstrate the superiority of the Neural Networks over the systems that were created by the winner of the KDD Cups competition and later researchers due  ...  This paper is partially based upon work supported by National Science Foundation Grant No.  ... 
doi:10.1109/itng.2006.33 dblp:conf/itng/NovikovYR06 fatcat:vkh6dyxoqfhv5ea2nnf2nhlsvq

A Novel Topology for Network Intrusion Detection with Anomaly Detection

M. Prashant, Ramesh Krishnan
2016 International Journal Of Engineering And Computer Science  
During this paper, we tend to discuss DM and NBA approaches for network intrusion observation and recommend that a mix of each approach has the potential to detect intrusions in networks additional effectively  ...  Moreover, Network Behavior Analysis (NBA) is additionally associate degree effective approach for intrusion detection.  ...  IV PROPOSED IDS MODEL BASED ON DM AND NBA Due to the many advantages of DM and NBA approaches in network intrusion detection, we suggest that a combination of both approaches can help develop a new generation  ... 
doi:10.18535/ijecs/v5i2.19 fatcat:v4p27wpgw5aorgi25mr4lstc2a

Intrusion Detection System and Its Attacks Detection: Comparative

Apoorv Singh Tomar, Brijesh Kumar Chaurasia
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
The initially distributed famous writing on PC organize security is where Denning examined different security concerns, exhibited a meaning of Intrusion Detection and talked about various sorts of Intrusion  ...  system, for example, the web.  ...  divided into different clusters for normal and anomalous traffic using the K-means clustering algorithm. 3) The resulting cluster centroids are deployed for fast detection of anomalies in new monitoring  ... 
doi:10.23956/ijarcsse/v7i1/0147 fatcat:5ycryegwvjf7vgl5p3aqckd6za

Flow-based intrusion detection

Anna Sperotto, Aiko Pras
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
ACKNOWLEDGMENT This research has been supported by the EC IST-EMANICS Network of Excellence (#26854) and the EU FP7-257513 UniverSelf Collaborative Project. AUTHOR'S PUBLICATION LIST  ...  Second, we may certainly say that each new approach to intrusion detection brings us a step forward towards having a safer network.  ...  This observation suggests that a feasible approach to flow-based intrusion detection should encompass the design of modular intrusion detection systems targeting specific applications.  ... 
doi:10.1109/inm.2011.5990529 dblp:conf/im/SperottoP11 fatcat:3taxkdmppfdfvpqr6i4t2ayjbi

A Network Intrusion Detection System Using Clustering and Outlier Detection
english

J.Antony Jeyanna, E.Indumathi
2015 International Journal of Innovative Research in Computer and Communication Engineering  
This paper proposes a hybrid intrusion detection method that uses a combination of supervised and outlier based methods for improving the efficiency of detection of new and old attacks.  ...  A number of intrusion detection methods have been developed for protecting computers and networks using conventional statistical methods as well as data mining methods.  ...  Network-based intrusion detection is generally implemented using two approaches: rule-based and anomaly-based.  ... 
doi:10.15680/ijircce.2015.0302038 fatcat:k5abywszmjhjbikdlcdn4hnetu

Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods

Panos Panagiotou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris
2021 Information & Security An International Journal  
Anomaly-based Intrusion Detection Systems and Signature-based Intrusion Detection Systems are two types of systems that have been proposed in the literature to detect security threats.  ...  In the current work, a taxonomy of current IDSs is presented, a review of recent works is performed, and we discuss some of the most common datasets used for evaluation.  ...  The signature-based approach involves searching the received events for well-known attack patterns, whereas the anomaly-based approach seeks to detect new and unknown attacks by modelling the activities  ... 
doi:10.11610/isij.5016 fatcat:tyfdhyipgjbildkg65wsbdfmti

Intrusion Detection System Using Machine Learning Approach

P. Akshaya
2016 International Journal Of Engineering And Computer Science  
In this paper, we present an intrusion detection model based on genetic algorithm and neural network.  ...  The key idea is to take advantage of classification abilities of genetic algorithm and neural network for intrusion detection system.  ...  In [14] , authors designed a GA based performance evaluation algorithm for network intrusion detection. The approach uses information theory for filtering the traffic data.  ... 
doi:10.18535/ijecs/v5i10.05 fatcat:f4aoqe6mmffd7mrscufawce2ke
« Previous Showing results 1 — 15 out of 23,544 results