Academic literature on the topic 'Adaptive Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adaptive Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adaptive Intrusion Detection System"
A. M., Riyad, M. S. Irfan Ahmed, and R. L. Raheemaa Khan. "An adaptive distributed Intrusion detection system architecture using multi agents." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 4951. http://dx.doi.org/10.11591/ijece.v9i6.pp4951-4960.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textLiu, Yang Bin, Liang Shi, Bei Zhan Wang, Yuan Qin Wu, and Pan Hong Wang. "An New Agent Based Distributed Adaptive Intrusion Detection System." Advanced Materials Research 532-533 (June 2012): 624–29. http://dx.doi.org/10.4028/www.scientific.net/amr.532-533.624.
Full textYu, Zhenwei, Jeffrey J. P. Tsai, and Thomas Weigert. "An adaptive automatically tuning intrusion detection system." ACM Transactions on Autonomous and Adaptive Systems 3, no. 3 (August 2008): 1–25. http://dx.doi.org/10.1145/1380422.1380425.
Full textP.S., Pawar, and Hashmi S.A. "Security Enhanced Adaptive Acknowledgment Intrusion Detection System." International Journal of Computer Applications 130, no. 7 (November 17, 2015): 51–56. http://dx.doi.org/10.5120/ijca2015907055.
Full textElfeshawy, Nawal A., and Osama S. Faragallah. "Divided two-part adaptive intrusion detection system." Wireless Networks 19, no. 3 (June 13, 2012): 301–21. http://dx.doi.org/10.1007/s11276-012-0467-7.
Full textIbrahim, Nurudeen Mahmud, and Anazida Zainal. "An Adaptive Intrusion Detection Scheme for Cloud Computing." International Journal of Swarm Intelligence Research 10, no. 4 (October 2019): 53–70. http://dx.doi.org/10.4018/ijsir.2019100104.
Full textHacini, Salima, Zahia Guessoum, and Mohamed Cheikh. "False Alarm Reduction Using Adaptive Agent-Based Profiling." International Journal of Information Security and Privacy 7, no. 4 (October 2013): 53–74. http://dx.doi.org/10.4018/ijisp.2013100105.
Full textChiche, Alebachew, and Million Meshesha. "Towards a Scalable and Adaptive Learning Approach for Network Intrusion Detection." Journal of Computer Networks and Communications 2021 (January 18, 2021): 1–9. http://dx.doi.org/10.1155/2021/8845540.
Full textOwens, Stephen F., and Reuven R. Levary. "An adaptive expert system approach for intrusion detection." International Journal of Security and Networks 1, no. 3/4 (2006): 206. http://dx.doi.org/10.1504/ijsn.2006.011780.
Full textDissertations / Theses on the topic "Adaptive Intrusion Detection System"
Barrios, Rita M. "An Adaptive Database Intrusion Detection System." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/86.
Full textStakhanova, Natalia. "A framework for adaptive, cost-sensitive intrusion detection and response system." [Ames, Iowa : Iowa State University], 2007.
Find full textTechateerawat, Piya, and piyat33@yahoo com. "Key distribution and distributed intrusion detection system in wireless sensor network." RMIT University. Electrical and Computer Systems Engineering, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080729.162610.
Full textShafi, Kamran Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "An online and adaptive signature-based approach for intrusion detection using learning classifier systems." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/38991.
Full textMohan, Sujaa Rani Park E. K. "Association rule based data mining approaches for Web Cache Maintenance and adaptive Intrusion Detection systems." Diss., UMK access, 2005.
Find full text"A thesis in computer science." Typescript. Advisor: E.K. Park. Vita. Title from "catalog record" of the print edition Description based on contents viewed March 12, 2007. Includes bibliographical references (leaves 159-162). Online version of the print edition.
Grizzard, Julian B. "Towards Self-Healing Systems: Re-establishing Trust in Compromised Systems." Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-04072006-133056/.
Full textSchwan, Karsten, Committee Member ; Schimmel, David, Committee Member ; Copeland, John, Committee Member ; Owen, Henry, Committee Chair ; Wills, Linda, Committee Member.
Sargolzaei, Arman. "Time-Delay Switch Attack on Networked Control Systems, Effects and Countermeasures." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2175.
Full textSainani, Varsha. "Hybrid Layered Intrusion Detection System." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/44.
Full textMaharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.
Full textTelemetry systems are migrating from links to networks. Security solutions that simply encrypt radio links no longer protect the network of Test Articles or the networks that support them. The use of network telemetry is dramatically expanding and new risks and vulnerabilities are challenging issues for telemetry networks. Most of these vulnerabilities are silent in nature and cannot be detected with simple tools such as traffic monitoring. The Intrusion Detection System (IDS) is a security mechanism suited to telemetry networks that can help detect abnormal behavior in the network. Our previous research in Network Intrusion Detection Systems focused on "Password" attacks and "Syn" attacks. This paper presents a generalized method that can detect both "Password" attack and "Syn" attack. In this paper, a K-means Clustering algorithm is used for vector quantization of network traffic. This reduces the scope of the problem by reducing the entropy of the network data. In addition, a Hidden-Markov Model (HMM) is then employed to help to further characterize and analyze the behavior of the network into states that can be labeled as normal, attack, or anomaly. Our experiments show that IDS can discover and expose telemetry network vulnerabilities using Vector Quantization and the Hidden Markov Model providing a more secure telemetry environment. Our paper shows how these can be generalized into a Network Intrusion system that can be deployed on telemetry networks.
Ademi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.
Full textBooks on the topic "Adaptive Intrusion Detection System"
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Mu nchen/Germany: Markt-und-Technik-Verl., 2003.
Find full textCarter, Earl. Cisco Secure Intrusion Detection System. Cisco Press, 2001.
Find full textCorchado, Emilio, and Álvaro Herrero. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Springer, 2014.
Find full textBlokdyk, Gerardus. Intrusion Detection System a Complete Guide - 2020 Edition. Emereo Pty Limited, 2020.
Find full textIntrusion Detection System Evasion durch Angriffsverschleierung in Exploiting Frameworks. Thomas Stein, 2010.
Find full textBook chapters on the topic "Adaptive Intrusion Detection System"
Stiborek, Jan, Martin Grill, Martin Rehak, Karel Bartos, and Jan Jusko. "Game Theoretical Model for Adaptive Intrusion Detection System." In Transactions on Computational Collective Intelligence XV, 133–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-45910-2_7.
Full textStiborek, Jan, Martin Grill, Martin Rehak, Karel Bartos, and Jan Jusko. "Game Theoretical Model for Adaptive Intrusion Detection System." In Transactions on Computational Collective Intelligence XV, 133–63. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44750-5_7.
Full textTiwari, Purnesh, Prakash Mishra, Upendra Singh, and Ravikant Itare. "New Adaptive Resonance Theory Based Intrusion Detection System." In Second International Conference on Computer Networks and Communication Technologies, 745–54. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_84.
Full textLee, Ki-Hyun, and Young B. Park. "A Study of Environment-Adaptive Intrusion Detection System." In Advances in Computer Science and Ubiquitous Computing, 625–30. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-3023-9_96.
Full textLee, Chang Seok, and Sung Bae Cho. "Learning Classifier Systems for Adaptive Learning of Intrusion Detection System." In International Joint Conference SOCO’17-CISIS’17-ICEUTE’17 León, Spain, September 6–8, 2017, Proceeding, 557–66. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67180-2_54.
Full textLu, Qiuwen, Zhou Zhou, Hongzhou Sha, Qingyun Liu, and Hongcheng Sun. "Self-Adaptive Frequency Scaling Architecture for Intrusion Detection System." In Trustworthy Computing and Services, 74–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-47401-3_10.
Full textDixit, Mrudul, and Rajashwini Ukarande. "Internet Traffic Intrusion Detection System Using Adaptive Neuro-Fuzzy Inference System." In Communications in Computer and Information Science, 21–28. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1423-0_3.
Full textMulimani, Deepa, Shashikumar G. Totad, Prakashgoud Patil, and Shivananda V. Seeri. "Adaptive Ensemble Learning with Concept Drift Detection for Intrusion Detection." In Advances in Intelligent Systems and Computing, 331–39. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0171-2_31.
Full textKrishnan, Deepa, and Madhumita Chatterjee. "An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework." In Communications in Computer and Information Science, 466–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34135-9_45.
Full textSethi, Kamalakanta, Rahul Kumar, Dinesh Mohanty, and Padmalochan Bera. "Robust Adaptive Cloud Intrusion Detection System Using Advanced Deep Reinforcement Learning." In Security, Privacy, and Applied Cryptography Engineering, 66–85. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66626-2_4.
Full textConference papers on the topic "Adaptive Intrusion Detection System"
Satam, Pratik. "Cross Layer Anomaly Based Intrusion Detection System." In 2015 IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW). IEEE, 2015. http://dx.doi.org/10.1109/sasow.2015.31.
Full textNguyen, Hai Thanh, and Katrin Franke. "Adaptive Intrusion Detection System via online machine learning." In 2012 12th International Conference on Hybrid Intelligent Systems (HIS). IEEE, 2012. http://dx.doi.org/10.1109/his.2012.6421346.
Full textZhao, Lin-hui, Yumin Wang, Jing Xiao, Ya-ping Dai, Fang-yan Dong, and Hai-le Liu. "A Three-Level-Module Adaptive Intrusion Detection System." In 2007 IEEE International Conference on Networking, Sensing and Control. IEEE, 2007. http://dx.doi.org/10.1109/icnsc.2007.372890.
Full textJiancheng, NI, LI Zhishu, SUN Jirong, and XING Jianchuan. "Self-adaptive Intrusion Detection System for Computational Grid." In First Joint IEEE/IFIP Symposium on Theoretical Aspects of Software Engineering (TASE '07). IEEE, 2007. http://dx.doi.org/10.1109/tase.2007.44.
Full textNovokhodko, Alexander, Donald C. Wunsch II, and Cihan H. Dagli. "Adaptive critic design for computer intrusion detection system." In Aerospace/Defense Sensing, Simulation, and Controls, edited by Kevin L. Priddy, Paul E. Keller, and Peter J. Angeline. SPIE, 2001. http://dx.doi.org/10.1117/12.421156.
Full textChavan, S., K. Shah, N. Dave, S. Mukherjee, A. Abraham, and S. Sanyal. "Adaptive neuro-fuzzy intrusion detection systems." In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. IEEE, 2004. http://dx.doi.org/10.1109/itcc.2004.1286428.
Full textKim, SunWoo, TaeGuen Kim, and Eul Gyu Im. "Real-time malware detection framework in intrusion detection systems." In the 2013 Research in Adaptive and Convergent Systems. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2513228.2513297.
Full textDeng, Lei, and De-yuan Gao. "Research on Immune Based Adaptive Intrusion Detection System Model." In 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.87.
Full textRangadurai Karthick, R., Vipul P. Hattiwale, and Balaraman Ravindran. "Adaptive network intrusion detection system using a hybrid approach." In 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS). IEEE, 2012. http://dx.doi.org/10.1109/comsnets.2012.6151345.
Full textChen, Shan-Tai, Chih-Chen Pan, and Chyi-Bao Yang. "An Adaptive Feedback Mechanism Algorithm for Intrusion Detection System." In 2009 2nd International Conference on Computer Science and its Applications (CSA). IEEE, 2009. http://dx.doi.org/10.1109/csa.2009.5404260.
Full textReports on the topic "Adaptive Intrusion Detection System"
Lundy, Philip A., George W. Pittman, and Heinz J. Pletsch. Intrusion Detection System Methodology Investigation. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada198210.
Full textDRAELOS, TIMOTHY J., MICHAEL J. COLLINS, DAVID P. DUGGAN, EDWARD V. THOMAS, and DONALD WUNSCH. Experiments on Adaptive Techniques for Host-Based Intrusion Detection. Office of Scientific and Technical Information (OSTI), September 2001. http://dx.doi.org/10.2172/787645.
Full textZage, Dolores M., and Wayne M. Zage. Intrusion Detection System Visualization of Network Alerts. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada532723.
Full textSpeed, Ann. Intrusion Detection System Alarm Station Operator Interface Improvements. Office of Scientific and Technical Information (OSTI), April 2019. http://dx.doi.org/10.2172/1762330.
Full textHeady, R., G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/425295.
Full textSkormin, Victor A. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data. Fort Belvoir, VA: Defense Technical Information Center, March 2012. http://dx.doi.org/10.21236/ada568124.
Full textChen, Yan. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1108982.
Full textKent, Stephen T., and Luis A. Sanchez. Secure Border Gateway Protocol and the External Routing Intrusion Detection System. Fort Belvoir, VA: Defense Technical Information Center, September 2000. http://dx.doi.org/10.21236/ada386679.
Full textKemmer, Richard A., and Giovanni Vigna. A Model-Based Real-Time Intrusion Detection System for Large Scale Heterogeneous Networks. Fort Belvoir, VA: Defense Technical Information Center, August 2003. http://dx.doi.org/10.21236/ada420824.
Full textFink, G. A., B. L. Chappell, T. G. Turner, and K. F. O'Donoghue. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada406577.
Full text