Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Contextual information fusion for intrusion detection: a survey and taxonomy

A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …

Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection

FE Ayo, SO Folorunso, AA Abayomi-Alli… - … Security Journal: A …, 2020 - Taylor & Francis
ABSTRACT Network Intrusion Detection System (NIDS) is often used to classify network
traffic in an attempt to protect computer systems from various network attacks. A major …

Selfish MAC layer misbehavior in wireless networks

P Kyasanur, NH Vaidya - IEEE transactions on mobile …, 2005 - ieeexplore.ieee.org
Wireless medium access control (MAC) protocols such as IEEE 802.11 use distributed
contention resolution mechanisms for sharing the wireless channel. In this environment …

[PDF][PDF] Detection and Handling of MAC Layer Misbehavior in Wireless Networks.

P Kyasanur, NH Vaidya - DSN, 2003 - Citeseer
Selfish hosts in wireless networks that fail to adhere to the MAC protocol may obtain an
unfair share of the channel bandwidth. We present modifications to the IEEE 802.11 backoff …

Hybrid intrusion detection with weighted signature generation over anomalous internet episodes

K Hwang, M Cai, Y Chen, M Qin - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
This paper reports the design principles and evaluation results of a new experimental hybrid
intrusion detection system (HIDS). This hybrid system combines the advantages of low false …

Network defense: Approaches, methods and techniques

RK Deka, KP Kalita, DK Bhattacharya… - Journal of Network and …, 2015 - Elsevier
To defend a network from intrusion is a generic problem of all time. It is important to develop
a defense mechanism to secure the network from anomalous activities. This paper presents …

[PDF][PDF] Computer immunology

LWY Lau - 2002 - Citeseer
Computer Immunology Page 1 Computer Immunology by Lyanne Wai-Yin Lau Supervised by
Daniel Bradley A thesis submitted to The Department of Information Technology and Electrical …

Integrated access control and intrusion detection for web servers

T Ryutov, C Neuman, K Dongho… - IEEE transactions on …, 2003 - ieeexplore.ieee.org
Current intrusion detection systems work in isolation from access control for the application
the systems aim to protect. The lack of coordination and interoperation between these …

Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory

D Yu, D Frincke - Proceedings of the 43rd annual Southeast regional …, 2005 - dl.acm.org
Accurate identification of misuse is a key factor in determining appropriate ways to protect
systems. Modern intrusion detection systems often use alerts from different sources such as …