Thesis Intrusion Detection System
ACM Press, “Learning non stationary models of normal network traffic for detecting novel attacks,” in Eighth ACM SIGKDD international conference on Knowledge discovery and data mining. Chan, “Learning Non stationary Models of Normal Network Traffic for Detecting Novel Attacks.” ACM SIGKDD international conference on Knowledge discovery and data mining, 2002. Wu, “ADAM: a testbed for exploring the use of data mining in intrusion detection,” in ACM SIGMOD Record: SPECIAL ISSUE: Special section on data mining for intrusion detection and threat analysis, vol.
CS-2003-06, Department of Computer Science, Florida Institute of Technology, 2003 Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Kumar, V., and Srivastava, J. The perceived latency was generally higher for Snort events than for Suricata events.The reason for this is probably the additional processing time applied by the implemented log conversion tool. 95-022, COAST Laboratory, Department of Computer Sciences, Purdue University, March 1994. Mark Crosbie, Gene Spafford, Defending a Computer System using Autonomous Agents, Technical report No. AINT misbehaving – A taxonomy of anti-intrusion techniques. of 18th NIST-NCSC National Information Systems Security Conference, pages 163–172, 1995. Ilgun, Koral, USTAT:a real time IDS for Unix, Proceedings of the 1993 IEEE Computer Society Symposium on research insecurity and privacy, 1993. Valdes, Next-generation intrusion detection expert system (NIDES), Technical report, SRI-CSL-95-07, SRI International, Computer Science Lab, May 1995." Paxson, Vern, Bro: A system for detecting network intruders in real-time, Computer Network, v 31, n 23, Dec 1999. S, Jajodia S, Modelling requests among cooperating IDSs, Computer Communications, v 23, n 17, Nov, 2000." J. Denning, An Intrusion-Detection Model, IEEE Transactions on Software Engineering, vol. of Computer Science and Engineering, IIT Khargpur 2008 Guy Bruneau – GSEC Version 1.2f,” The History and Evolution of Intrusion Detection”, SANS Institute 2001. Genetic Algorithms in Search, Optimization and Machine Learning. Protocol Anomaly Detection for Network-based Intrusion Detection, SANS Institute, GSEC Practical Assignment Version 1.2f, 2001 M. Ibitola Ayobami, “Strategic Sensor Placement for Intrusion Detection in Network-Based IDS” I. Intelligent Systems and Applications, 2014, 02, 61-68, I. Intelligent Systems and Applications, 2014, 02, 61-68 Vasilios S.; Fotini P., “Application of anomaly detection algorithms for detecting SYN flooding attacks”, Elsevier, Computer Communications, Vol. 1433, 1442, 2006 Dorothy D., “An Intrusion-Detection Model”, IEEE Transactions on Software Engineering, Vol. 1987 James C.; Jay H., “A Comparative Analysis of Current Intrusion Detection Technologies”, Proceeding of 4th Technology for Information Security Conference, TISC’96, Houston, TX, May.1996" Anurag Jain, Bhupendra Verma and J. Rana., “Anomaly Intrusion Detection Techniques: A Brief Review”, International Journal of Scientific & Engineering Research, Vol 5(7), 2014 Manasi Gyanchandani, J.