Nate: N etwork analysis of a nomalous t raffic e vents, a low-cost approach

C Taylor, J Alves-Foss - Proceedings of the 2001 workshop on New …, 2001 - dl.acm.org
A new approach to network intrusion detection is needed to solve the monitoring problems
of high volume network data and the time constraints for Intrusion Detection System (IDS) …

An empirical analysis of nate: Network analysis of anomalous traffic events

C Taylor, J Alves-Foss - Proceedings of the 2002 workshop on New …, 2002 - dl.acm.org
This paper presents results of an empirical analysis of NATE (Network Analysis of
Anomalous Traffic Events), a lightweight, anomaly based intrusion detection tool. Previous …

[PDF][PDF] Survey of current network intrusion detection techniques

S Kumar - Washington Univ. in St. Louis, 2007 - cse.wustl.edu
The importance of network security has grown tremendously and a number of devices have
been introduced to improve the security of a network. Network intrusion detection systems …

An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection

MV Mahoney, PK Chan - International Workshop on Recent Advances in …, 2003 - Springer
Abstract The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set
is the most widely used public benchmark for testing intrusion detection systems. Our …

[PDF][PDF] Detection of novel network attacks using data mining

L Ertoz, E Eilertson, A Lazarevic, PN Tan… - Proc. of Workshop on …, 2003 - Citeseer
This paper introduces the Minnesota Intrusion Detection System (MINDS), which uses a
suite of data mining techniques to automatically detect attacks against computer networks …

[PDF][PDF] Detection and summarization of novel network attacks using data mining

L Ertoz, E Eilertson, A Lazarevic, P Tan… - Minnesota INtrusion …, 2003 - academia.edu
This paper introduces the Minnesota Intrusion Detection System (MINDS), which uses a
suite of data mining techniques to automatically detect attacks against computer networks …

Toward a reliable anomaly-based intrusion detection in real-world environments

EK Viegas, AO Santin, LS Oliveira - Computer Networks, 2017 - Elsevier
A popular approach for detecting network intrusion attempts is to monitor the network traffic
for anomalies. Extensive research effort has been invested in anomaly-based network …

A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice

O Salem, S Vaton, A Gravey - International Journal of Network …, 2010 - Wiley Online Library
In this paper, we present the design and implementation of a new approach for anomaly
detection and classification over high speed networks. The proposed approach is based first …

Network intrusion detection

B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
Intrusion detection is a new, retrofit approach for providing a sense of security in existing
computers and data networks, while allowing them to operate in their current" open" mode …

Survey on incremental approaches for network anomaly detection

MH Bhuyan, DK Bhattacharyya, JK Kalita - arXiv preprint arXiv:1211.4493, 2012 - arxiv.org
As the communication industry has connected distant corners of the globe using advances
in network technology, intruders or attackers have also increased attacks on networking …