Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions

W Li, W Meng, LF Kwok - IEEE Communications Surveys & …, 2021 - ieeexplore.ieee.org
Owing to the swift growth in cyber attacks, intrusion detection systems (IDSs) have become a
necessity to help safeguard personal and organizational assets. However, with the …

The use of artificial intelligence based techniques for intrusion detection: a review

G Kumar, K Kumar, M Sachdeva - Artificial Intelligence Review, 2010 - Springer
The Internet connects hundreds of millions of computers across the world running on
multiple hardware and software platforms providing communication and commercial …

Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model

S Aljawarneh, M Aldwairi, MB Yassein - Journal of Computational Science, 2018 - Elsevier
Efficiently detecting network intrusions requires the gathering of sensitive information. This
means that one has to collect large amounts of network transactions including high details of …

Intrusion detection using sequences of system calls

SA Hofmeyr, S Forrest… - Journal of computer …, 1998 - journals.sagepub.com
A method is introduced for detecting intrusions at the level of privileged processes. Evidence
is given that short sequences of system calls executed by running processes are a good …

Distributed intrusion detection system in a multi-layer network architecture of smart grids

Y Zhang, L Wang, W Sun, RC Green II… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
The advent of the smart grid promises to usher in an era that will bring intelligence,
efficiency, and optimality to the power grid. Most of these changes will occur as an Internet …

Architecture for an artificial immune system

SA Hofmeyr, S Forrest - Evolutionary computation, 2000 - ieeexplore.ieee.org
An artificial immune system (ARTIS) is described which incorporates many properties of
natural immune systems, including diversity, distributed computation, error tolerance …

[PDF][PDF] EMERALD: Event monitoring enabling response to anomalous live disturbances

PA Porras, PG Neumann - Proceedings of the 20th national information …, 1997 - csrc.nist.gov
The EMERALD (Event Monitori ng Enabli ng Responses to Anomal ous Li ve Di sturbances)
envi ronment isa di stri buted scal abl e tool sui te for tracki ng mal i ci ous acti vi tythrough …

Intrusion detection using an ensemble of intelligent paradigms

S Mukkamala, AH Sung, A Abraham - Journal of network and computer …, 2005 - Elsevier
Soft computing techniques are increasingly being used for problem solving. This paper
addresses using an ensemble approach of different soft computing and hard computing …

Intrusion detection with comparative analysis of supervised learning techniques and fisher score feature selection algorithm

D Aksu, S Üstebay, MA Aydin, T Atmaca - … , ISCIS 2018, Held at the 24th …, 2018 - Springer
Rapid development of technologies not only makes life easier, but also reveals a lot of
security problems. Develo** and changing of attack types affect many people …

An architecture for intrusion detection using autonomous agents

JS Balasubramaniyan… - … conference (Cat. No …, 1998 - ieeexplore.ieee.org
The intrusion detection system architectures commonly used in commercial and research
systems have a number of problems that limit their configurability, scalability or efficiency …