scispace - formally typeset
Search or ask a question

Showing papers on "Intrusion detection system published in 1970"


01 Jan 1970
TL;DR: This paper proposes a strategy to focus on detection involving statistical analysis of both attack and normal traffics based on the training data of KDD Cup 99, which includes a hybrid statistical approach which uses Data Mining and Decision Tree Classification.
Abstract: Although intelligent intrusion and detection strategies are used to detect any false alarms within the network critical segments of network infrastructures, reducing false positives is still a major challenge. Up to this moment, these strategies focus on either detection or response features, but often lack of having both features together. Without considering those features together, intrusion detection systems probably will not be able to highly detect on low false alarm rates. To offset the abovementioned constraints, this paper proposes a strategy to focus on detection involving statistical analysis of both attack and normal traffics based on the training data of KDD Cup 99. This strategy also includes a hybrid statistical approach which uses Data Mining and Decision Tree Classification. As a result, the statistical analysis can be manipulated to reduce misclassification of false positives and distinguish between attacks and false positives for the data of KDD Cup 99. Therefore, this strategy can be used to evaluate and enhance the capability of the IDS to detect and at the same time to respond to the threats and benign traffic in critical segments of network, application and database infrastructures.

65 citations


Patent
16 Jan 1970
TL;DR: In this paper, a surveillance and intrusion detection system is provided using a scanning-type sensor to monitor a field of view and transmit a video signal to a moving target indicator (MTI) the output of which is applied to an alarm system through a threshold level detector having a relatively low-threshold level for higher system sensitivity.
Abstract: A surveillance and intrusion detection system is provided using a scanning-type sensor to monitor a field of view and transmit a video signal to a moving target indicator (MTI) the output of which is applied to an alarm system through a threshold level detector having a relatively low-threshold level for higher system sensitivity. A correlation unit minimizes false alarms which could occur from high-level noise by transmitting pulses to the alarm system only when they occur at approximately the same place in three successive scanning lines. Other units are provided for correlation of other possible moving targets in the same line. When transmitted pulses are added to the video signal from the sensor for display, the outline of a moving target is brightened.

5 citations


Journal ArticleDOI
TL;DR: This paper discusses an interdiscipli nary approach of security, where AI and security cooperation cannot be effective without a clean and careful approach.
Abstract: This paper discusses an interdiscipli nary approach of security. Artificial Intelligence (AI) techniques can be helpful for such security aspects as: intrusion detection, real time audit trail analysis, supervision, etc. But, without a clean and careful approach, this AI and security cooperation cannot be effective.

2 citations