A novel hybrid intrusion detection method integrating anomaly detection with misuse detection

G Kim, S Lee, S Kim - Expert Systems with Applications, 2014 - Elsevier
… In this paper, a new hybrid intrusion detection method that hierarchically integrates a misuse
detection model and an anomaly detection model in a decomposition structure is proposed. …

Toward credible evaluation of anomaly-based intrusion-detection methods

M Tavallaee, N Stakhanova… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
… in the area of anomaly-based intrusion detection published during the period of 2000–…
methods for intrusion detection. Thus, any methods specifically developed for fault, fraud detection

Intrusion detection methods based on integrated deep learning model

Z Wang, Y Liu, D He, S Chan - computers & security, 2021 - Elsevier
… For network intrusion detection, this paper designs an integrated deep intrusion detection
deep neural network models, and to achieve timely response to intrusion behavior. For host …

Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process

B Molina-Coronado, U Mori… - … on Network and …, 2020 - ieeexplore.ieee.org
… • We propose a taxonomy of NIDS detection methods based on the data mining terminology
to avoid the ambiguity of previous classification proposals. To that end, we use two different …

Intrusion detection system: A comprehensive review

HJ Liao, CHR Lin, YC Lin, KY Tung - Journal of Network and Computer …, 2013 - Elsevier
… At first, we make a clear distinction about intrusion, intrusion detection, intrusion detection
system (IDS) and intrusion prevention system (IPS). NIST (Bace and Mell, 2001) describes the …

Comparative research on network intrusion detection methods based on machine learning

C Zhang, D Jia, L Wang, W Wang, F Liu, A Yang - Computers & Security, 2022 - Elsevier
… to network intrusion detection to improve detection efficiency and … in the field of network
intrusion detection and provide the … machine learning algorithms in intrusion detection in the past …

A multi-level intrusion detection method for abnormal network behaviors

SY Ji, BK Jeong, S Choi, DH Jeong - Journal of Network and Computer …, 2016 - Elsevier
… To have better knowledge about network intrusions, this paper focuses on designing a
multi-level network detection method. Mainly, it is composed of three steps as (1) understanding …

Y-means: A clustering method for intrusion detection

Y Guan, AA Ghorbani, N Belacel - CCECE 2003-Canadian …, 2003 - ieeexplore.ieee.org
… We need effective intrusion detection systems to pmtect our computers fmm these … learning
methods for Intrusion Detection can only detect known intrusions since these methods classifi …

A methodology for testing intrusion detection systems

NJ Puketza, K Zhang, M Chung… - IEEE Transactions …, 1996 - ieeexplore.ieee.org
… Section 4 begins the discussion of our testing methodology by first identifying a set of important
IDS … In hs section, we present some information on intrusions and intrusion detection as …

An anomaly intrusion detection method by clustering normal user behavior

SH Oh, WS Lee - Computers & Security, 2003 - Elsevier
… in a host-based anomaly detection system, this paper proposes a new anomaly detection
method which utilizes a clustering method. The proposed method is explained by a density-…