[PDF][PDF] Intrusion detection systems: A survey and taxonomy

S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …

Towards a taxonomy of intrusion-detection systems

H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …

Revised taxonomy for intrusion-detection systems

H Debar, M Dacier, A Wespi - Annales des Telecommunications …, 2000 - research.ibm.com
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or in general against information systems. Indeed, it is difficult to provide provably …

Real time monitoring and analysis of events from multiple network security devices

HS Njemanze, PS Kothari - US Patent 7,376,969, 2008 - Google Patents
30 are cross-correlated according to rules to generate meta events. The security events may
be gathered remotely from a system at which the cross-correlating is performed. Any meta …

Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Contextual information fusion for intrusion detection: a survey and taxonomy

A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …

Probabilistic alert correlation

ADJ Valdes, K Skinner - US Patent 7,917,393, 2011 - Google Patents
In preferred embodiments, intrusion detection systems for computer networks include
sensors that monitor both net work traffic and network resources. Correlation techniques are …

[PDF][PDF] Research in intrusion-detection systems: A survey

S Axelsson - 1998 - engineering.iastate.edu
There is currently need for an up-to-date and thorough survey of the research in the field of
computer and network intrusion detection. This paper presents such a survey, with a …

Intrusion and intrusion detection

J McHugh - International Journal of Information Security, 2001 - Springer
Assurance technologies for computer security have failed to have significant impacts in the
marketplace, with the result that most of the computers connected to the internet are …

Real time monitoring and analysis of events from multiple network security devices

HS Njemanze, PS Kothari - US Patent 8,056,130, 2011 - Google Patents
Security events generated by a number of network devices are gathered and normalized to
produce normalized security events in a common schema. The normalized security events …