[PDF][PDF] Survey of current network intrusion detection techniques

S Kumar - Washington Univ. in St. Louis, 2007 - cse.wustl.edu
The importance of network security has grown tremendously and a number of devices have
been introduced to improve the security of a network. Network intrusion detection systems …

[PDF][PDF] Snort: Lightweight intrusion detection for networks.

M Roesch - Lisa, 1999 - usenix.org
Network intrusion detection systems (NIDS) are an important part of any network security
architecture. They provide a layer of defense which monitors network traffic for predefined …

Nate: N etwork analysis of a nomalous t raffic e vents, a low-cost approach

C Taylor, J Alves-Foss - Proceedings of the 2001 workshop on New …, 2001 - dl.acm.org
A new approach to network intrusion detection is needed to solve the monitoring problems
of high volume network data and the time constraints for Intrusion Detection System (IDS) …

A high-performance network intrusion detection system

R Sekar, Y Guang, S Verma, T Shanbhag - Proceedings of the 6th ACM …, 1999 - dl.acm.org
In this paper we present a new approach for network intrusion detection based on concise
specifications that characterize normal and abnormal network packet sequences. Our …

Network intrusion detection

B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
Intrusion detection is a new, retrofit approach for providing a sense of security in existing
computers and data networks, while allowing them to operate in their current" open" mode …

A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach

MY Su, GJ Yu, CY Lin - Computers & security, 2009 - Elsevier
None of the previously proposed Network Intrusion Detection Systems (NIDSs), which are
subject to fuzzy association rules, can meet real-time requirements because they all apply …

Automatic network intrusion detection: Current techniques and open issues

CA Catania, CG Garino - Computers & Electrical Engineering, 2012 - Elsevier
Automatic network intrusion detection has been an important research topic for the last
20years. In that time, approaches based on signatures describing intrusive behavior have …

[图书][B] Network intrusion detection

S Northcutt, J Novak - 2002 - books.google.com
The Chief Information Warfare Officer for the entire United States teaches you how to protect
your corporate network. This book is a training aid and reference for intrusion detection …

The architecture of a network level intrusion detection system

R Heady, G Luger, A Maccabe, M Servilla - 1990 - osti.gov
This paper presents the preliminary architecture of a network level intrusion detection
system. The proposed system will monitor base level information in network packets (source …

An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection

MV Mahoney, PK Chan - International Workshop on Recent Advances in …, 2003 - Springer
Abstract The DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set
is the most widely used public benchmark for testing intrusion detection systems. Our …