A survey of anomaly intrusion detection techniques

Y Yu - Journal of Computing Sciences in Colleges, 2012 - dl.acm.org
Intrusion detection systems are based on two fundamental approaches: the detection of
anomalous behavior as it deviates from normal behavior, and misuse detection by …

A study in using neural networks for anomaly and misuse detection

AK Ghosh, A Schwartzbard - 8th USENIX Security Symposium (USENIX …, 1999 - usenix.org
Current intrusion detection systems lack the ability to generalize from previously observed
attacks to detect even slight variations of known attacks. This paper describes new process …

Machine learning applications in misuse and anomaly detection

J Sen, S Mehtab - Security and privacy from a legal, ethical, and …, 2020 - books.google.com
Abstract Machine learning and data mining algorithms play important roles in designing
intrusion detection systems. Based on their approaches toward the detection of attacks in a …

[PDF][PDF] Data mining machine learning techniques–A study on abnormal anomaly detection system

MS Narayana, B Prasad, A Srividhya… - International Journal of …, 2011 - academia.edu
HE explosive increase in the number of networked machines and the widespread use of the
internet in organizations have led to an increase in the number of unauthorized activities, not …

Rule-based integration of multiple measure-models for effective intrusion detection

SJ Han, SB Cho - … Theme-System Security and Assurance (Cat …, 2003 - ieeexplore.ieee.org
As the reliance on computers increases, security of critical computers becomes more
important. An IDS detects unauthorized usage and misuse by a local user as well as …

A machine learning approach to anomaly detection

PK Chan, MV Mahoney, MH Arshad - 2003 - repository.fit.edu
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

Behavioral features for network anomaly detection

JP Early, CE Brodley - Machine learning and data mining for computer …, 2006 - Springer
Research in network intrusion detection has traditionally been divided into two components–
misuse detection and anomaly detection. The distinction between the two comes from the …

[PDF][PDF] A review of anomaly based intrusion detection systems

V Jyothsna, R Prasad, KM Prasad - International Journal of Computer …, 2011 - Citeseer
With the advent of anomaly-based intrusion detection systems, many approaches and
techniques have been developed to track novel attacks on the systems. High detection rate …

Toward credible evaluation of anomaly-based intrusion-detection methods

M Tavallaee, N Stakhanova… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Since the first introduction of anomaly-based intrusion detection to the research community
in 1987, the field has grown tremendously. A variety of methods and techniques introducing …

A review of machine learning based anomaly detection techniques

H Kaur, G Singh, J Minhas - arXiv preprint arXiv:1307.7286, 2013 - arxiv.org
Intrusion detection is so much popular since the last two decades where intrusion is
attempted to break into or misuse the system. It is mainly of two types based on the …