Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

A survey of stealth malware attacks, mitigation measures, and steps toward autonomous open world solutions

EM Rudd, A Rozsa, M Günther… - … Surveys & Tutorials, 2016 - ieeexplore.ieee.org
As our professional, social, and financial existences become increasingly digitized and as
our government, healthcare, and military infrastructures rely more on computer technologies …

Detecting intrusions using system calls: Alternative data models

C Warrender, S Forrest… - Proceedings of the 1999 …, 1999 - ieeexplore.ieee.org
Intrusion detection systems rely on a wide variety of observable data to distinguish between
legitimate and illegitimate activities. We study one such observable-sequences of system …

Network anomaly detection by cascading k-Means clustering and C4. 5 decision tree algorithm

AP Muniyandi, R Rajeswari, R Rajaram - Procedia Engineering, 2012 - Elsevier
Intrusions pose a serious securing risk in a network environment. Network intrusion
detection system aims to identify attacks or malicious activity in a network with a high …

Host-based intrusion detection using dynamic and static behavioral models

DY Yeung, Y Ding - Pattern recognition, 2003 - Elsevier
Intrusion detection has emerged as an important approach to network security. In this paper,
we adopt an anomaly detection approach by detecting possible intrusions based on …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …

A game theoretic approach to decision and analysis in network intrusion detection

T Alpcan, T Basar - … conference on decision and control (IEEE …, 2003 - ieeexplore.ieee.org
We investigate the basic trade-offs, analysis and decision processes involved in information
security and intrusion detection, as well as possible application of game theoretic concepts …

Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Indra: A peer-to-peer approach to network intrusion detection and prevention

R Janakiraman, M Waldvogel… - WET ICE 2003 …, 2003 - ieeexplore.ieee.org
While the spread of the Internet has made the network ubiquitous, it has also rendered
networked systems vulnerable to malicious attacks orchestrated from anywhere. These …

D-SCIDS: Distributed soft computing intrusion detection system

A Abraham, R Jain, J Thomas, SY Han - Journal of Network and Computer …, 2007 - Elsevier
An Intrusion Detection System (IDS) is a program that analyzes what happens or has
happened during an execution and tries to find indications that the computer has been …