scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters
Proceedings ArticleDOI

Intrusion detection using pattern recognition methods

TL;DR: Two supervised methods, the support vector machine as well as the multi-layer neural network have been tested and the results display high detection rate and low false alarm rate, which is promising for real world applications.
Journal ArticleDOI

Detection of Botnet Using Flow Analysis and Clustering Algorithm

TL;DR: This paper proposes a detection model using the clustering algorithm to group bot traffic and normal traffic into two different clusters, and demonstrates the fact that with the help of clustering the complete dataset is separated into two entirely distinguishable clusters.
Proceedings ArticleDOI

One-stop: A novel hybrid model for intrusion detection system

TL;DR: A hybrid model for intrusion detection system is proposed, which have enhanced quality of detecting the unknown attack via anomaly based detection and also have module which will try to reduce the number of false alarm generated by the system.
Proceedings ArticleDOI

An Integrated Fuzzy Ants and Artificial Immune Recognition System for Anomaly Detection

TL;DR: A novel approach for detecting intrusion based on bio-inspired algorithm that combines the fuzzy ants clustering algorithm and artificial immune recognition algorithm to maximize detection accuracy and minimize computational complexity is highlighted.
Dissertation

Adaptive Intrusion Detection Based on KSVMeans Algorithm

Parneet Kaur, +1 more
TL;DR: .....................................................................................................i Table of Table of Contents; ii Table of References; III Table of references.