Access the full text.
Sign up today, get DeepDyve free for 14 days.
H. Vaccaro, G. Liepins (1989)
Detection of anomalous computer session activityProceedings. 1989 IEEE Symposium on Security and Privacy
M Crosbie, EH Spafford (1995)
Active defense of a computer system using autonomous agents. Technical report CSD-TR- 95-008
Anup Ghosh, James Wanken, F. Charron (1998)
Detecting anomalous and unknown intrusions against programsProceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)
Chih-Fong Tsai, Yu-Feng Hsu, Chia-Ying Lin, Wei-Yang Lin (2009)
Intrusion detection by machine learning: A reviewExpert Syst. Appl., 36
Chan Kuok, A. Fu, M. Wong (1998)
Mining fuzzy association rules in databasesSIGMOD Rec., 27
L. Rokach (2010)
Ensemble-based classifiersArtificial Intelligence Review, 33
A. Bivens, Chandrika Palagiri, Rasheda Smith, B. Szymanski, M. Embrechts (2002)
NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS
M. Mahoney, P. Chan (2001)
PHAD: packet header anomaly detection for identifying hostile network traffic
B. Balajinath, S.V Raghavan (2001)
Intrusion detection through learning behavior modelComput. Commun., 24
N. Idris, Bharanidharan Shanmugam (2005)
Artificial Intelligence Techniques Applied to Intrusion Detection2005 Annual IEEE India Conference - Indicon
J. Quinlan (1992)
C4.5: Programs for Machine Learning
Mark Crosbie, E. Spafford (1995)
Active Defense of a Computer System using Autonomous Agents
Stuart Staniford-Chen, Steven Cheung, Rick Crawford, M. Dilger, Jeremy Frank, James Hoagland, K. Levitt, C. Wee, Raymond Yip, Dan Zerkle (1996)
GrIDS A Graph-Based Intrusion Detection System for Large Networks
Tsong Hwang, Tsung-Ju Lee, Yuh-Jye Lee (2007)
A three-tier IDS via data mining approach
M. Mahoney, P. Chan (2002)
Learning nonstationary models of normal network traffic for detecting novel attacksProceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
C. Fortuna, B. Fortuna, Mihael Mohor (2007)
ANOMALY DETECTION IN COMPUTER NETWORKS USING LINEAR SVMs
Srinivas Mukkamala, A. Sung (2003)
Artificial intelligent techniques for intrusion detectionSMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483), 2
I. Goldberg, D. Wagner, Randi Thomas, Eric Brewer (1996)
A secure environment for untrusted helper applications confining the Wily Hacker
Yuhai Wu (2021)
Statistical Learning TheoryTechnometrics, 41
K Ilgun, AK Richard, AP Phillip (1995)
State transition analysis: a rule-based intrusion detectionIEEE Trans Softw Eng, 21
Christopher Krügel, D. Mutz, William Robertson, Fredrik Valeur (2003)
Bayesian event classification for intrusion detection19th Annual Computer Security Applications Conference, 2003. Proceedings.
D. Heckerman (1999)
A Tutorial on Learning with Bayesian Networks
H. Mannila, Hannu Toivonen (1996)
Discovering Generalized Episodes Using Minimal Occurrences
J. Hartigan (1975)
Clustering Algorithms
Jonatan Gómez, D. Dasgupta (2002)
Evolving Fuzzy Classifiers for Intrusion Detection
(1997)
EMERLAD
E. Spafford, D. Zamboni (2000)
Intrusion detection using autonomous agentsComput. Networks, 34
J. Ryan, M. Lin, R. Miikkulainen (1997)
Intrusion Detection with Neural Networks
Debra Anderson, T. Frivold, A. Valdes (1997)
Next-generation Intrusion Detection Expert System (NIDES)A Summary
G. Stoneburner (2001)
SP 800-33. Underlying Technical Models for Information Technology Security
A. Patcha, J. Park (2007)
An overview of anomaly detection techniques: Existing solutions and latest technological trendsComput. Networks, 51
S. Smaha (1988)
Haystack: an intrusion detection system[Proceedings 1988] Fourth Aerospace Computer Security Applications
V. Paxson (1998)
Bro: a system for detecting network intruders in real-timeComput. Networks, 31
N. Habra, B. Charlier, Abdelaziz Mounji, Isabelle Mathieu (1992)
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis
D Novikov, RV Yampolskiy, L Reznik (2006)
Artificial intelligence approaches for intrusion detection. Systems, applications and technology conference, LISAT 2006IEEE Long Island, 5
A. Ypma, R. Duin (1997)
Novelty Detection Using Self-Organizing Maps
A. Zainal, M. Maarof, S. Shamsuddin
Ensemble Classifiers for Network Intrusion Detection System
E. Menahem, A. Shabtai, L. Rokach, Y. Elovici (2009)
Improving malware detection by applying multi-inducer ensembleComput. Stat. Data Anal., 53
Fei Wang, Yuwen Qian, Yue-wei Dai, Zhiquan Wang (2010)
A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection2010 International Conference on Communications and Mobile Computing, 1
H. Kayacik, A. Zincir-Heywood, M. Heywood (2003)
On the capability of an SOM based intrusion detection systemProceedings of the International Joint Conference on Neural Networks, 2003., 3
(2010)
Internet Security Systems (ISS) (2010) Real Secure http://www.iss.net
M. Mahoney, P. Chan (2002)
Learning Models of Network Traffic for Detecting Novel Attacks
R. Holte (1993)
Very Simple Classification Rules Perform Well on Most Commonly Used DatasetsMachine Learning, 11
Srilatha Chebrolu, A. Abraham, Johnson Thomas (2005)
Feature deduction and ensemble design of intrusion detection systemsComput. Secur., 24
Srinivas Mukkamala, A. Sung (2003)
A comparative study of techniques for intrusion detectionProceedings. 15th IEEE International Conference on Tools with Artificial Intelligence
S Staniford-Chen, B Tung, D Schnackenberg (1998)
The common intrusion detection framework (CIDF)
Bahaa Zbeel (2004)
Using Genetic Algorithm for Network Intrusion Detection
George John, P. Langley (1995)
Estimating Continuous Distributions in Bayesian Classifiers
Mark Crosbie, Bryn Dole, Todd Ellis, Ivan Krsul, E. Spafford (1996)
IDIOT - Users Guide
(1990)
The computerwatch data reduction tool
L Ertoz, E Eilertson, A Lazarevic, P Tan, J Srivastava, V Kumar, P Dokas (2004)
The MINDS—Minnesota intrusion detection system. Next generation data mining
S. Rawat (2005)
Efficient data mining algorithms for intrusion detection
Chittur, Adhitya, A. Chittur (2001)
Model Generation for an Intrusion Detection System Using Genetic Algorithms
Y. Liao, V. Vemuri (2002)
Use of K-Nearest Neighbor classifier for intrusion detectionComput. Secur., 21
H. Highland (1995)
AIN'T misbehaving—A taxonomy of anti-intrusion techniquesComputers & Security, 14
G. Stein, Bing Chen, A. Wu, K. Hua (2005)
Decision tree classifier for network intrusion detection with GA-based feature selectionProceedings of the 43rd annual Southeast regional conference - Volume 2
J. Beale (2004)
Snort 2.1 Intrusion Detection, Second Edition
(2003)
cyberspace scofflaws. Addison-Wesley, pp 175–210
Satinder Singh, Guljeet Kaur (2007)
Unsupervised Anomaly Detection In Network Intrusion Detection Using Clusters
Jianxiong Luo (1999)
INTEGRATING FUZZY LOGIC WITH DATA MINING METHODS FOR INTRUSION DETECTION
J. Hochberg, K. Jackson, C. Stallings, J. McClary, D. DuBois, J. Ford (1993)
NADIR: An automated system for detecting network intrusion and misuseComput. Secur., 12
T. Beaubouef, F. Petry (2009)
Rough Sets
Ramesh Agarwal, Mahesh JoshiyMarch (2004)
PNrule : A New Framework for Learning Classifier Models in Data Mining ( A Cast-Study in Network Intrusion Detection ) Technical Report
Itzhak Levin (2000)
KDD-99 classifier learning contest LLSoft's results overviewSIGKDD Explor., 1
Gene Kim, E. Spafford (1997)
Tripwire: a case study in integrity monitoring
R. Lippmann, R. Cunningham (2000)
Improving Intrusion Detection Performance using Keyword Selection and Neural NetworksComput. Networks, 34
William Cohen (1995)
Fast Effective Rule Induction
Sang-Jun Han, Sung-Bae Cho (2005)
Evolutionary neural networks for anomaly detection based on the behavior of a programIEEE transactions on systems, man, and cybernetics. Part B, Cybernetics : a publication of the IEEE Systems, Man, and Cybernetics Society, 36 3
L. Herberlein, Gihan Dias, K. Levitt, B. Mukherjee, J. Wood, David Wolber (1990)
A network security monitorProceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
Yuchun Lee (1989)
Classifiers : adaptive modules in pattern recognition systems
Sandhya Peddabachigari, A. Abraham, C. Grosan, Johnson Thomas (2007)
Modeling intrusion detection system using hybrid intelligent systemsJ. Netw. Comput. Appl., 30
(2000)
Detecting computer attackers: recognizing patterns of malicious stealthy behavior. MIT Lincoln Laboratory—presentation to CERIAS
Andrew Hay, D. Cid, R. Bray (2008)
OSSEC Host-Based Intrusion Detection Guide
S. Hong (1997)
Data miningFuture Gener. Comput. Syst., 13
Wun-Hwa Chen, Sheng-Hsun Hsu, Hwang-Pin Shen (2005)
Application of SVM and ANN for intrusion detectionComput. Oper. Res., 32
P. García-Teodoro, J. Verdejo, G. Maciá-Fernández, E. Vázquez (2009)
Anomaly-based network intrusion detection: Techniques, systems and challengesComput. Secur., 28
J. Dickerson, J. Dickerson (2000)
Fuzzy network profiling for intrusion detectionPeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500)
D. Aha, D. Kibler, M. Albert (2004)
Instance-based learning algorithmsMachine Learning, 6
Srinivas Mukkamala, A. Sung, A. Abraham (2005)
Intrusion detection using an ensemble of intelligent paradigmsJ. Netw. Comput. Appl., 28
L. Khan, M. Awad, B. Thuraisingham (2007)
A new intrusion detection system using support vector machines and hierarchical clusteringThe VLDB Journal, 16
G. Demiröz, H. Güvenir (1997)
Classification by Voting Feature Intervals
V. Degeler, A. Lazovik (2003)
Proceedings. 15th IEEE International Conference on Tools with Artificial IntelligenceProceedings. 15th IEEE International Conference on Tools with Artificial Intelligence
S. Stolfo, A. Prodromidis, Shelley Tselepis, Wenke Lee, David Fan, P. Chan (1997)
JAM: Java Agents for Meta-Learning over Distributed Databases
Andrew Baker, Brian Caswell, M. Poor (2004)
Snort 2.1 intrusion detection
M. Panda, M. Patra (2008)
A Comparative Study of Data Mining Algorithms for Network Intrusion Detection2008 First International Conference on Emerging Trends in Engineering and Technology
Leonid Portnoy (2000)
Intrusion detection with unlabeled data using clustering
Srinivas Mukkamala, A. Sung (2003)
Feature Selection for Intrusion Detection with Neural Networks and Support Vector MachinesTransportation Research Record, 1822
Maheshkumar Sabhnani, G. Serpen (2003)
Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context
(1999)
DARPA intrusion detection evaluation design and procedure
Farnaz Gharibian, A. Ghorbani (2007)
Comparative Study of Supervised Machine Learning Techniques for Intrusion DetectionFifth Annual Conference on Communication Networks and Services Research (CNSR '07)
Dima Novikov, Roman Yampolskiy, Leon Reznik (2006)
ARTIFICIAL INTELLIGENCE APPROACHES FOR INTRUSION DETECTION2006 IEEE Long Island Systems, Applications and Technology Conference
D. Dasgupta, F. González (2001)
An Intelligent Decision Support System for Intrusion Detection and Response
G. Carpenter, S. Grossberg, N. Markuzon, J. Reynolds, D. Rosen (1992)
Fuzzy ARTMAP: A neural network architecture for incremental supervised learning of analog multidimensional mapsIEEE transactions on neural networks, 3 5
K. Ilgun, R. Kemmerer, Phillip Porras (1995)
State Transition Analysis: A Rule-Based Intrusion Detection ApproachIEEE Trans. Software Eng., 21
R. Duda, P. Hart (1974)
Pattern classification and scene analysis
The Internet connects hundreds of millions of computers across the world running on multiple hardware and software platforms providing communication and commercial services. However, this interconnectivity among computers also enables malicious users to misuse resources and mount Internet attacks. The continuously growing Internet attacks pose severe challenges to develop a flexible, adaptive security oriented methods. Intrusion detection system (IDS) is one of most important component being used to detect the Internet attacks. In literature, different techniques from various disciplines have been utilized to develop efficient IDS. Artificial intelligence (AI) based techniques plays prominent role in development of IDS and has many benefits over other techniques. However, there is no comprehensive review of AI based techniques to examine and understand the current status of these techniques to solve the intrusion detection problems. In this paper, various AI based techniques have been reviewed focusing on development of IDS. Related studies have been compared by their source of audit data, processing criteria, technique used, dataset, classifier design, feature reduction technique employed and other experimental environment setup. Benefits and limitations of AI based techniques have been discussed. The paper will help the better understanding of different directions in which research has been done in the field of IDS. The findings of this paper provide useful insights into literature and are beneficial for those who are interested in applications of AI based techniques to IDS and related fields. The review also provides the future directions of the research in this area.
Artificial Intelligence Review – Springer Journals
Published: Sep 4, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.