A survey on data-driven network intrusion detection

D Chou, M Jiang - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Data-driven network intrusion detection (NID) has a tendency towards minority attack
classes compared to normal traffic. Many datasets are collected in simulated environments …

Anomaly detection methods in wired networks: a survey and taxonomy

JM Estevez-Tapiador, P Garcia-Teodoro… - Computer …, 2004 - Elsevier
Despite the advances reached along the last 20 years, anomaly detection in network
behavior is still an immature technology, and the shortage of commercial tools thus …

Adaboost-based algorithm for network intrusion detection

W Hu, W Hu, S Maybank - IEEE Transactions on Systems, Man …, 2008 - ieeexplore.ieee.org
Network intrusion detection aims at distinguishing the attacks on the Internet from normal
use of the Internet. It is an indispensable part of the information security system. Due to the …

A hybrid machine learning approach to network anomaly detection

T Shon, J Moon - Information Sciences, 2007 - Elsevier
Zero-day cyber attacks such as worms and spy-ware are becoming increasingly widespread
and dangerous. The existing signature-based intrusion detection mechanisms are often not …

Service specific anomaly detection for network intrusion detection

C Krügel, T Toth, E Kirda - Proceedings of the 2002 ACM symposium on …, 2002 - dl.acm.org
The constant increase of attacks against networks and their resources (as recently shown by
the CodeRed worm) causes a necessity to protect these valuable assets. Firewalls are now …

[PDF][PDF] HIDE: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification

Z Zhang, J Li, CN Manikopoulos… - Proc. IEEE Workshop …, 2001 - cs.rhodes.edu
In this paper we introduce the Hierarchical Intrusion DEtection (HIDE) system, which detects
network-based attacks as anomalies using statistical preprocessing and neural network …

Intrusion detection: A survey

A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …

Online adaboost-based parameterized methods for dynamic distributed network intrusion detection

W Hu, J Gao, Y Wang, O Wu… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Current network intrusion detection systems lack adaptability to the frequently changing
network environments. Furthermore, intrusion detection in the new distributed architectures …

Network intrusion and fault detection: a statistical anomaly approach

C Manikopoulos… - IEEE Communications …, 2002 - ieeexplore.ieee.org
With the advent and explosive growth of the global Internet and electronic commerce
environments, adaptive/automatic network/service intrusion and anomaly detection in wide …

[PDF][PDF] Minds-minnesota intrusion detection system

L Ertoz, E Eilertson, A Lazarevic… - Next generation …, 2004 - www-users.cse.umn.edu
This paper introduces the Minnesota Intrusion Detection System (MINDS), which uses a
suite of data mining techniques to automatically detect attacks against computer networks …