[HTML][HTML] Machine learning and deep learning methods for intrusion detection systems: A survey

H Liu, B Lang - applied sciences, 2019 - mdpi.com
Networks play important roles in modern life, and cyber security has become a vital research
area. An intrusion detection system (IDS) which is an important cyber security technique …

On the nature and types of anomalies: a review of deviations in data

R Foorthuis - International journal of data science and analytics, 2021 - Springer
Anomalies are occurrences in a dataset that are in some way unusual and do not fit the
general patterns. The concept of the anomaly is typically ill defined and perceived as vague …

Jamming attacks on remote state estimation in cyber-physical systems: A game-theoretic approach

Y Li, L Shi, P Cheng, J Chen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
We consider security issues in remote state estimation of Cyber-Physical Systems (CPS). A
sensor node communicates with a remote estimator through a wireless channel which may …

Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory

J McHugh - ACM Transactions on Information and System Security …, 2000 - dl.acm.org
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative
evaluation of intrusion detection systems (IDSs) developed under DARPA funding. While …

Network intrusion detection

B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
Intrusion detection is a new, retrofit approach for providing a sense of security in existing
computers and data networks, while allowing them to operate in their current" open" mode …

Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - journals.sagepub.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

Towards a taxonomy of intrusion-detection systems

H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …

[PDF][PDF] Intrusion detection systems: A survey and taxonomy

S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …

An overview of IP flow-based intrusion detection

A Sperotto, G Schaffrath, R Sadre… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
Intrusion detection is an important area of research. Traditionally, the approach taken to find
attacks is to inspect the contents of every packet. However, packet inspection cannot easily …

Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …