A systematic review on intrusion detection based on the Hidden Markov Model

A Ahmadian Ramaki, A Rasoolzadegan… - … Analysis and Data …, 2018 - Wiley Online Library
Apart from using traditional security solutions in software systems such as firewalls and
access control mechanisms, utilizing intrusion detection systems are also necessary …

Layered approach using conditional random fields for intrusion detection

KK Gupta, B Nath, R Kotagiri - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Intrusion detection faces a number of challenges; an intrusion detection system must reliably
detect malicious activities in a network and must perform efficiently to cope with the large …

[PDF][PDF] Develo** a high-accuracy cross platform host-based intrusion detection system capable of reliably detecting zero-day attacks

G Creech - 2014 - scholar.archive.org
Current anomaly host-based intrusion detection systems are limited in accuracy with any
increase in detection rate resulting in a corresponding increase in false alarm rate …

An exploratory analysis of mobile development issues using stack overflow

M Linares-Vásquez, B Dit… - 2013 10th Working …, 2013 - ieeexplore.ieee.org
Question & answer (Q&A) websites, such as Stack Overflow (SO), are widely used by
developers to find and provide answers to technical issues and concerns in software …

Processing of massive audit data streams for real-time anomaly intrusion detection

W Wang, X Guan, X Zhang - Computer communications, 2008 - Elsevier
Intrusion detection is an important technique in the defense-in-depth network security
framework. Most current intrusion detection models lack the ability to process massive audit …

Intrusion detection system for applications using linux containers

AS Abed, C Clancy, DS Levy - … , STM 2015, Vienna, Austria, September 21 …, 2015 - Springer
Linux containers are gaining increasing traction in both individual and industrial use, and as
these containers get integrated into mission-critical systems, real-time detection of malicious …

Applying bag of system calls for anomalous behavior detection of applications in linux containers

AS Abed, TC Clancy, DS Levy - 2015 IEEE globecom …, 2015 - ieeexplore.ieee.org
In this paper, we present the results of using bags of system calls for learning the behavior of
Linux containers for use in anomaly-detection based intrusion detection system. By using …

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data

W Wang, X Guan, X Zhang, L Yang - computers & security, 2006 - Elsevier
Intrusion detection is an important technique in the defense-in-depth network security
framework. In recent years, it has been a widely studied topic in computer network security …

A host-based anomaly detection approach by representing system calls as states of kernel modules

SS Murtaza, W Khreich… - 2013 IEEE 24th …, 2013 - ieeexplore.ieee.org
Despite over two decades of research, high false alarm rates, large trace sizes and high
processing times remain among the key issues in host-based anomaly intrusion detection …

Behavioral analysis of system call sequences using LSTM Seq-Seq, cosine similarity and jaccard similarity for real-time anomaly detection

J Soni, N Prabakar, H Upadhyay - … International Conference on …, 2019 - ieeexplore.ieee.org
With the advent of technology, sophisticated malware presents a significant threat to
computer security. In this work, we propose anomaly detection techniques that learn three …