scispace - formally typeset
Search or ask a question
Topic

Intrusion detection system

About: Intrusion detection system is a research topic. Over the lifetime, 28444 publications have been published within this topic receiving 509530 citations. The topic is also known as: Intrusion Detection System & IDS.


Papers
More filters
Book ChapterDOI
15 Mar 2010
TL;DR: An innovative, distributed, multilayer approach for detecting known and unknown attacks on industrial control systems using process event correlation, critical state detection and critical state aggregation is presented.
Abstract: This paper presents an innovative, distributed, multilayer approach for detecting known and unknown attacks on industrial control systems The approach employs process event correlation, critical state detection and critical state aggregation The paper also describes a prototype implementation and provides experimental results that validate the intrusion detection approach

10 citations

Proceedings ArticleDOI
02 Dec 2013
TL;DR: This work presents a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures that uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance.
Abstract: We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors and detectors. We also describe how the framework is used in three different attack scenarios. For each of the three attack scenarios, we describe how the attack itself works and how it could be detected. We describe what data is monitored in our framework and how the detection is conducted using anomaly detection methods. We also present evaluation of the detection using synthetic and real data sets. Our experimental evaluation across all three scenarios shows that our tools perform well in practical situations and provide a promising direction for future research.

10 citations

Proceedings ArticleDOI
05 May 2008
TL;DR: This paper tries to address the problem of managing alerts via a multi-layer alert correlation and Itering that can identify critical alerts after each step of correlation andItering and achieves very good results in terms of critical alert detection rates, running time of approach and its memory usage.
Abstract: One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and multi-step attack scenarios or false alerts and non-critical ones. In this paper we try to address the problem of managing alerts via a multi-layer alert correlation and Itering that can identify critical alerts after each step of correlation and Itering. After applying the approach on LL DDoS 1.0 data set, we achieved very good results in terms of critical alert detection rates, running time of approach and its memory usage. Our method could extract all of critical and multi-step attacks in LL DDoS 1.0 data set while we had almost 90% reduction in number of alerts.

10 citations

Proceedings Article
01 Jan 2012

10 citations

Book ChapterDOI
14 May 2004
TL;DR: In this system, firewall redirects a session from an abnormal user to HoneyPot to learn the advanced intrusion skills and to respond more effectively to protect a system from the new attacks.
Abstract: In this paper, we implement a HoneyPot system equipped with several sub systems for their use. Obtaining the new knowledge on the access skills of intruder allows us to make a policy more precisely and quickly to protect a system from the new attacks. Our implementation presents an HoneyPot System cooperates with firewall and management server. In this system, firewall redirects a session from an abnormal user to HoneyPot to learn the advanced intrusion skills and to respond more effectively.

10 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
92% related
Encryption
98.3K papers, 1.4M citations
92% related
Network packet
159.7K papers, 2.2M citations
90% related
Wireless network
122.5K papers, 2.1M citations
89% related
Wireless
133.4K papers, 1.9M citations
88% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20244
20231,576
20223,380
20211,889
20202,133
20191,971