A survey of intrusion detection in wireless network applications

R Mitchell, R Chen - Computer Communications, 2014 - Elsevier
Abstract Information systems are becoming more integrated into our lives. As this integration
deepens, the importance of securing these systems increases. Because of lower installation …

Unsupervised anomaly-based malware detection using hardware features

A Tang, S Sethumadhavan, SJ Stolfo - Research in Attacks, Intrusions and …, 2014 - Springer
Recent works have shown promise in detecting malware programs based on their dynamic
microarchitectural execution patterns. Compared to higher-level features like OS and …

Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data

A Azaria, A Richardson, S Kraus… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The problem of insider threat is receiving increasing attention both within the computer
science community as well as government and industry. This paper starts by presenting a …

VMM-based intrusion detection system

M Moffie, D Kaeli, A Cohen, J Aslam… - US Patent …, 2014 - Google Patents
An intrusion detection system collects architectural level events from a Virtual Machine
Monitor where the collected events represent operation of a corresponding Virtual Machine …

[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Planning and integrating deception into computer security defenses

MH Almeshekah, EH Spafford - Proceedings of the 2014 New Security …, 2014 - dl.acm.org
Deceptive techniques played a prominent role in many human conflicts throughout history.
Digital conflicts are no different as the use of deception has found its way to computing since …

[PDF][PDF] Developing a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks

G Creech - 2014 - scholar.archive.org
Current anomaly host-based intrusion detection systems are limited in accuracy with any
increase in detection rate resulting in a corresponding increase in false alarm rate …

EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

W Meng, W Li, LF Kwok - computers & security, 2014 - Elsevier
Signature-based network intrusion detection systems (NIDSs) have been widely deployed in
current network security infrastructure. However, these detection systems suffer from some …

Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD

M Xie, J Hu, J Slay - 2014 11th International Conference on …, 2014 - ieeexplore.ieee.org
ADFA-LD is a recently released data set for evaluating host-based anomaly detection
systems, aiming to substitute the existing benchmark data sets which have failed to reflect …

Systems and methods for adaptive model generation for detecting intrusions in computer systems

A Honig, A Howard, E Eskin, SJ Stolfo - US Patent 8,893,273, 2014 - Google Patents
A system and methods for detecting intrusions in the operation of a computer system
comprises a sensor configured to gather information regarding the operation of the computer …