Academic literature on the topic 'Intrusion Detection System'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Intrusion Detection System.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Intrusion Detection System"
Zhao, Xuemin. "Application of Data Mining Technology in Software Intrusion Detection and Information Processing." Wireless Communications and Mobile Computing 2022 (June 9, 2022): 1–8. http://dx.doi.org/10.1155/2022/3829160.
Full textSimavoryan, Simon Zhorzhevich, Arsen Rafikovich Simonyan, Georgii Aleksandrovich Popov, and Elena Ivanovna Ulitina. "The procedure of intrusions detection in information security systems based on the use of neural networks." Программные системы и вычислительные методы, no. 3 (March 2020): 1–9. http://dx.doi.org/10.7256/2454-0714.2020.3.33734.
Full textVeselý, A., and D. Brechlerová. "Neural networks in intrusion detection systems." Agricultural Economics (Zemědělská ekonomika) 50, No. 1 (February 24, 2012): 35–40. http://dx.doi.org/10.17221/5164-agricecon.
Full textSolomon, Irin Anna, Aman Jatain, and Shalini Bhaskar Bajaj. "Intrusion Detection System Using Deep Learning." Asian Journal of Computer Science and Technology 8, no. 2 (May 5, 2019): 105–10. http://dx.doi.org/10.51983/ajcst-2019.8.2.2132.
Full textPriyavengatesh, A. "A Predictive Model Using Deep Learning Neural Network for Efficient Intrusion Detection." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (October 31, 2023): 577–85. http://dx.doi.org/10.22214/ijraset.2023.56020.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2020.030336.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030341.
Full textMuhammad Arslan Tariq, Muhammad Arslan Tariq. "Anomaly based Intrusion Detection System." International Journal for Electronic Crime Investigation 3, no. 3 (September 6, 2019): 7. http://dx.doi.org/10.54692/ijeci.2019.030336.
Full textBattini Sujatha, Et al. "An Efficient Fuzzy Based Multi Level Clustering Model Using Artificial Bee Colony For Intrusion Detection." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (November 30, 2023): 264–73. http://dx.doi.org/10.17762/ijritcc.v11i11.9390.
Full textDissertations / Theses on the topic "Intrusion Detection System"
Sainani, Varsha. "Hybrid Layered Intrusion Detection System." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_theses/44.
Full textMaharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.
Full textTelemetry systems are migrating from links to networks. Security solutions that simply encrypt radio links no longer protect the network of Test Articles or the networks that support them. The use of network telemetry is dramatically expanding and new risks and vulnerabilities are challenging issues for telemetry networks. Most of these vulnerabilities are silent in nature and cannot be detected with simple tools such as traffic monitoring. The Intrusion Detection System (IDS) is a security mechanism suited to telemetry networks that can help detect abnormal behavior in the network. Our previous research in Network Intrusion Detection Systems focused on "Password" attacks and "Syn" attacks. This paper presents a generalized method that can detect both "Password" attack and "Syn" attack. In this paper, a K-means Clustering algorithm is used for vector quantization of network traffic. This reduces the scope of the problem by reducing the entropy of the network data. In addition, a Hidden-Markov Model (HMM) is then employed to help to further characterize and analyze the behavior of the network into states that can be labeled as normal, attack, or anomaly. Our experiments show that IDS can discover and expose telemetry network vulnerabilities using Vector Quantization and the Hidden Markov Model providing a more secure telemetry environment. Our paper shows how these can be generalized into a Network Intrusion system that can be deployed on telemetry networks.
Sonbul, O., M. Byamukama, S. Alzebda, and A. N. Kalashnikov. "Autonomous intrusion detection information system." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28777.
Full textAdemi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.
Full textSatam, Shalaka Chittaranjan, and Shalaka Chittaranjan Satam. "Bluetooth Anomaly Based Intrusion Detection System." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/625890.
Full textPrasad, Praveen. "A dynamically reconfigurable intrusion detection system." NCSU, 2003. http://www.lib.ncsu.edu/theses/available/etd-05202003-181843/.
Full textSong, Jingping. "Feature selection for intrusion detection system." Thesis, Aberystwyth University, 2016. http://hdl.handle.net/2160/3143de58-208f-405e-ab18-abcecfc8f33b.
Full textBarrios, Rita M. "An Adaptive Database Intrusion Detection System." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/86.
Full textMoyers, Benjamin. "Multi-Vector Portable Intrusion Detection System." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34265.
Full textMaster of Science
Le, Anhtuan. "Intrusion Detection System for detecting internal threats in 6LoWPAN." Thesis, Middlesex University, 2017. http://eprints.mdx.ac.uk/21958/.
Full textBooks on the topic "Intrusion Detection System"
Tsukerman, Emmanuel. Designing a Machine Learning Intrusion Detection System. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6591-8.
Full textHerrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
Find full textReal world Linux security: Intrusion protection, detection, and recovery. 2nd ed. Upper Saddle River, N.J: Prentice Hall, 2003.
Find full textToxen, Bob. Real-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textReal-world Linux security: Intrusion, prevention, detection, and recovery. Upper Saddle River, NJ: Prentice Hall, 2001.
Find full textSpenneberg, Ralf. Intrusion Detection fu r Linux-Server: Mit Open-Source-Tools Angriffe erkennen und analysieren ; mit einer Einfu hrung in die digitale Forensik. Mu nchen/Germany: Markt-und-Technik-Verl., 2003.
Find full textIntrusion detection systems. 2nd ed. Boston: Butterworths, 1988.
Find full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Boston, MA: Springer-Verlag US, 2008.
Find full textNing, Peng, Sushil Jajodia, and X. Sean Wang. Intrusion Detection in Distributed Systems. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0467-2.
Full textBeale, Jay. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full textBook chapters on the topic "Intrusion Detection System"
Yi, Myung-Kyu, and Chong-Sun Hwang. "Intrusion-Tolerant Intrusion Detection System." In Intelligence and Security Informatics, 476–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25952-7_38.
Full textWang, Wei, Thomas Guyet, and Svein J. Knapskog. "Autonomic Intrusion Detection System." In Lecture Notes in Computer Science, 359–61. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04342-0_24.
Full textJuluru, Anudeep, Shriram K. Vasudevan, and T. S. Murugesh. "Home Intrusion Detection System." In Let's Get IoT-fied!, 317–33. Boca Raton: CRC Press, 2022. http://dx.doi.org/10.1201/9781003147169-17.
Full textMukherjee, Avigyan, Mohammad Ammar, and P. Vigneshwaran. "Novel Intrusion Detection System." In Lecture Notes in Networks and Systems, 685–704. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84760-9_58.
Full textRajaallah, El Mostafa, Samir Achraf Chamkar, and Soumiya Ain El Hayat. "Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System." In Smart Data and Computational Intelligence, 284–96. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11914-0_30.
Full textNing, Peng, Sushil Jajodia, and X. Sean Wang. "System View and Event History." In Intrusion Detection in Distributed Systems, 13–18. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0467-2_3.
Full textNing, Peng, Sushil Jajodia, and X. Sean Wang. "CARDS: An Experimental System for Detecting Distributed Attacks." In Intrusion Detection in Distributed Systems, 91–109. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4615-0467-2_8.
Full textMrdovic, Sasa, and Branislava Drazenovic. "KIDS – Keyed Intrusion Detection System." In Detection of Intrusions and Malware, and Vulnerability Assessment, 173–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14215-4_10.
Full textChatziadam, Panos, Ioannis G. Askoxylakis, Nikolaos E. Petroulakis, and Alexandros G. Fragkiadakis. "Early Warning Intrusion Detection System." In Trust and Trustworthy Computing, 222–23. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-08593-7_22.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security, 273–98. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.
Full textConference papers on the topic "Intrusion Detection System"
Prasad, Romesh, and Young Moon. "Adaptive Intrusion Detection System for Cyber-Manufacturing System." In ASME 2021 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/imece2021-70017.
Full textSilva Neto, Manuel Gonçalves da, and Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Full textLiu, Jiannan, Kun Xiao, Lei Luo, Yun Li, and Lirong Chen. "An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2020. http://dx.doi.org/10.1109/qrs51102.2020.00028.
Full textS. P, Sujini, AnbuShamini G. N, and Prija J. S. "Deep Intrusion Detection for DOS and DDOS Attacks Using LSTM and Deep Autoencoder Neural Network." In The International Conference on scientific innovations in Science, Technology, and Management. International Journal of Advanced Trends in Engineering and Management, 2023. http://dx.doi.org/10.59544/qkfn6548/ngcesi23p93.
Full textVincent, M., P. Arumugam, and G. Prabhakara Rao. "Interior Intrusion Detection System." In 2019 International Carnahan Conference on Security Technology (ICCST). IEEE, 2019. http://dx.doi.org/10.1109/ccst.2019.8888412.
Full textSayed, Mahmoud Abdelhafeez, and Mostafa Taha. "Oblivious Intrusion Detection System." In 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2022. http://dx.doi.org/10.1109/host54066.2022.9840140.
Full textHan, Keesook J., and Joseph Giordano. "Intrusion Detection System Modeling." In 2006 HPCMP Users Group Conference (HPCMP-UGC'06). IEEE, 2006. http://dx.doi.org/10.1109/hpcmp-ugc.2006.41.
Full textAnupama, A., and Rendhir R. Prasad. "Hybrid Intrusion Detection System." In 2023 International Conference on Quantum Technologies, Communications, Computing, Hardware and Embedded Systems Security (iQ-CCHESS). IEEE, 2023. http://dx.doi.org/10.1109/iq-cchess56596.2023.10391328.
Full textVinila Jinny, S., and J. Jaya Kumari. "Neuralised intrusion detection system." In 2011 International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN). IEEE, 2011. http://dx.doi.org/10.1109/icsccn.2011.6024530.
Full textTabrizi, Farid Molazem, and Karthik Pattabiraman. "Intrusion Detection System for Embedded Systems." In Middleware '15: 16th International Middleware Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2843966.2843975.
Full textReports on the topic "Intrusion Detection System"
Lundy, Philip A., George W. Pittman, and Heinz J. Pletsch. Intrusion Detection System Methodology Investigation. Fort Belvoir, VA: Defense Technical Information Center, March 1988. http://dx.doi.org/10.21236/ada198210.
Full textSkormin, Victor A. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data. Fort Belvoir, VA: Defense Technical Information Center, March 2012. http://dx.doi.org/10.21236/ada568124.
Full textZage, Dolores M., and Wayne M. Zage. Intrusion Detection System Visualization of Network Alerts. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada532723.
Full textSpeed, Ann. Intrusion Detection System Alarm Station Operator Interface Improvements. Office of Scientific and Technical Information (OSTI), April 2019. http://dx.doi.org/10.2172/1762330.
Full textHeady, R., G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/425295.
Full textChen, Yan. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1108982.
Full textKent, Stephen T., and Luis A. Sanchez. Secure Border Gateway Protocol and the External Routing Intrusion Detection System. Fort Belvoir, VA: Defense Technical Information Center, September 2000. http://dx.doi.org/10.21236/ada386679.
Full textSmith, Michael, Erin Acquesta, Arlo Ames, Alycia Carey, Christopher Cuellar, Richard Field, Trevor Maxfield, et al. SAGE Intrusion Detection System: Sensitivity Analysis Guided Explainability for Machine Learning. Office of Scientific and Technical Information (OSTI), September 2021. http://dx.doi.org/10.2172/1820253.
Full textFink, G. A., B. L. Chappell, T. G. Turner, and K. F. O'Donoghue. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems. Fort Belvoir, VA: Defense Technical Information Center, April 2002. http://dx.doi.org/10.21236/ada406577.
Full textKemmer, Richard A., and Giovanni Vigna. A Model-Based Real-Time Intrusion Detection System for Large Scale Heterogeneous Networks. Fort Belvoir, VA: Defense Technical Information Center, August 2003. http://dx.doi.org/10.21236/ada420824.
Full text