Academic literature on the topic 'Network security intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network security intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Network security intrusion detection"
Patidar, Sadhana, Priyanka Parihar, and Chetan Agrawal. "A Review of Intrusion Detection Datasets and Techniques." SMART MOVES JOURNAL IJOSCIENCE 6, no. 3 (March 10, 2020): 14–22. http://dx.doi.org/10.24113/ijoscience.v6i3.277.
Full textJavidi, Mohammad Masoud. "Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs." Computer Engineering and Applications Journal 4, no. 1 (February 18, 2015): 31–42. http://dx.doi.org/10.18495/comengapp.v4i1.111.
Full textLiu, Gui Guo. "Intrusion Detection Systems." Applied Mechanics and Materials 596 (July 2014): 852–55. http://dx.doi.org/10.4028/www.scientific.net/amm.596.852.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textReshmi, B. M., S. S. Manvi, and Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks." Mobile Information Systems 2, no. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Full textAranganathan, A., and C. D. Suriyakala. "Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i2.20.11736.
Full textErlansari, Aan, Funny Farady Coastera, and Afief Husamudin. "Early Intrusion Detection System (IDS) using Snort and Telegram approach." SISFORMA 7, no. 1 (June 10, 2020): 21. http://dx.doi.org/10.24167/sisforma.v7i1.2629.
Full textMahfouz, Ahmed, Abdullah Abuhussein, Deepak Venugopal, and Sajjan Shiva. "Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset." Future Internet 12, no. 11 (October 26, 2020): 180. http://dx.doi.org/10.3390/fi12110180.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (November 1, 2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems." Mathematical Problems in Engineering 2021 (March 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/6639714.
Full textDissertations / Theses on the topic "Network security intrusion detection"
Maharjan, Nadim, and Paria Moazzemi. "Telemetry Network Intrusion Detection System." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581632.
Full textTelemetry systems are migrating from links to networks. Security solutions that simply encrypt radio links no longer protect the network of Test Articles or the networks that support them. The use of network telemetry is dramatically expanding and new risks and vulnerabilities are challenging issues for telemetry networks. Most of these vulnerabilities are silent in nature and cannot be detected with simple tools such as traffic monitoring. The Intrusion Detection System (IDS) is a security mechanism suited to telemetry networks that can help detect abnormal behavior in the network. Our previous research in Network Intrusion Detection Systems focused on "Password" attacks and "Syn" attacks. This paper presents a generalized method that can detect both "Password" attack and "Syn" attack. In this paper, a K-means Clustering algorithm is used for vector quantization of network traffic. This reduces the scope of the problem by reducing the entropy of the network data. In addition, a Hidden-Markov Model (HMM) is then employed to help to further characterize and analyze the behavior of the network into states that can be labeled as normal, attack, or anomaly. Our experiments show that IDS can discover and expose telemetry network vulnerabilities using Vector Quantization and the Hidden Markov Model providing a more secure telemetry environment. Our paper shows how these can be generalized into a Network Intrusion system that can be deployed on telemetry networks.
Abdullah, Kulsoom B. "Scaling and Visualizing Network Data to Facilitate in Intrusion Detection Tasks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/10509.
Full textYang, Yi. "Intrusion detection for communication network security in power systems." Thesis, Queen's University Belfast, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.603572.
Full textBalupari, Ravindra. "Real-time network-based anomaly intrusion detection." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174579398.
Full textAdemi, Muhamet. "Web-Based Intrusion Detection System." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20271.
Full textPark, Yongro. "A statistical process control approach for network intrusion detection." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6835.
Full textStefanova, Zheni Svetoslavova. "Machine Learning Methods for Network Intrusion Detection and Intrusion Prevention Systems." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7367.
Full textHuang, Yi-an. "Intrusion Detection and Response Systems for Mobile Ad Hoc Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14053.
Full textPikoulas, John. "An agent-based Bayesian method for network intrusion detection." Thesis, Edinburgh Napier University, 2003. http://researchrepository.napier.ac.uk/Output/4057.
Full textHaas, Steffen [Verfasser]. "Security Monitoring and Alert Correlation for Network Intrusion Detection / Steffen Haas." Hamburg : Staats- und Universitätsbibliothek Hamburg Carl von Ossietzky, 2020. http://d-nb.info/123199780X/34.
Full textBooks on the topic "Network security intrusion detection"
Judy, Novak, ed. Network intrusion detection. 3rd ed. Indianapolis, Ind: New Riders Pub., 2002.
Find full textEscamilla, Terry. Intrusion detection: Network security beyond the firewall. New York: John Wiley, 1998.
Find full textIntrusion detection. Indianapolis, IN: Macmillan Technical Publishing, 2000.
Find full textNetwork intrusion detection: An analyst's handbook. Indianapolis, Ind: New Riders, 1999.
Find full textJudy, Novak, and McLachlan Donald, eds. Network intrusion detection: An analyst's handbook. 2nd ed. Indianapolis, Ind: New Riders, 2001.
Find full textRoberto, Di Pietro, and SpringerLink (Online service), eds. Intrusion Detection Systems. Boston, MA: Springer-Verlag US, 2008.
Find full textManu, Zacharia, ed. Network intrusion alert: An ethical hacking guide to intrusion detection. Boston, MA: Thomson Course Technology PTR, 2008.
Find full text1980-, Lu Wei, and Tavallaee Mahbod, eds. Network intrusion detection and prevention: Concepts and techniques. New York: Springer, 2010.
Find full textIntrusion detection with Snort. Indianapolis, Ind: Sams, 2003.
Find full textC, Foster James, ed. Snort 2.0 intrusion detection. Rockland, Mass: Syngress, 2003.
Find full textBook chapters on the topic "Network security intrusion detection"
Perez, André. "Intrusion Detection." In Network Security, 237–51. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2014. http://dx.doi.org/10.1002/9781119043942.ch10.
Full textEdge, Charles, William Barker, Beau Hunter, and Gene Sullivan. "Network Scanning, Intrusion Detection, and Intrusion Prevention Tools." In Enterprise Mac Security, 485–504. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2731-1_17.
Full textEdge, Charles, and Daniel O’Donnell. "Network Scanning, Intrusion Detection, and Intrusion Prevention Tools." In Enterprise Mac Security, 441–57. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1712-2_17.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security, 273–98. London: Springer London, 2015. http://dx.doi.org/10.1007/978-1-4471-6654-2_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security, 275–301. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-55606-2_13.
Full textKizza, Joseph Migga. "System Intrusion Detection and Prevention." In Guide to Computer Network Security, 271–95. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4543-1_13.
Full textDagorn, Nathalie. "Cooperative Intrusion Detection for Web Applications." In Cryptology and Network Security, 286–302. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11935070_20.
Full textvan Oorschot, Paul C. "Intrusion Detection and Network-Based Attacks." In Information Security and Cryptography, 309–38. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33649-3_11.
Full textLi, Tao, Xiaojie Liu, and Hongbin Li. "A New Model for Dynamic Intrusion Detection." In Cryptology and Network Security, 72–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11599371_7.
Full textRosenberg, Ishai, and Ehud Gudes. "Evading System-Calls Based Intrusion Detection Systems." In Network and System Security, 200–216. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_14.
Full textConference papers on the topic "Network security intrusion detection"
Silva Neto, Manuel Gonçalves da, and Danielo G. Gomes. "Network Intrusion Detection Systems Design: A Machine Learning Approach." In XXXVII Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbrc.2019.7413.
Full textVigna, Giovanni. "Network intrusion detection." In the 26th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1920261.1920279.
Full textDavis, J., E. Hill, L. Spradley, M. Wright, W. Scherer, and Y. Zhang. "Network security monitoring - intrusion detection." In Proceedings of the 2003 IEEE Systems and Information Engineering Design Symposium. IEEE, 2003. http://dx.doi.org/10.1109/sieds.2003.158030.
Full textChen, Xinjia, and Ernest Walker. "Fast detection of network intrusion." In SPIE Defense, Security, and Sensing, edited by Raja Suresh. SPIE, 2011. http://dx.doi.org/10.1117/12.883626.
Full textLiu, Jiannan, Kun Xiao, Lei Luo, Yun Li, and Lirong Chen. "An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection." In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2020. http://dx.doi.org/10.1109/qrs51102.2020.00028.
Full textBhuyan, Saptarshi, Dilip Kumar Barman, and Abhijit Bhowmick. "Wireless Network Security Using Intrusion Detection System." In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553724.
Full textNeuschmied, Helmut, Martin Winter, Katharina Hofer-Schmitz, Branka Stojanovic, and Ulrike Kleb. "Two Stage Anomaly Detection for Network Intrusion Detection." In 7th International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and Technology Publications, 2021. http://dx.doi.org/10.5220/0010233404500457.
Full textAkujuobi, C. M., and N. K. Ampah. "Enterprise network intrusion detection and prevention system (ENIDPS)." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2007. http://dx.doi.org/10.1117/12.719994.
Full textYan, Qiao, and Jianping Yu. "AINIDS: an immune-based network intrusion detection system." In Defense and Security Symposium, edited by Belur V. Dasarathy. SPIE, 2006. http://dx.doi.org/10.1117/12.664752.
Full textBhatia, Rohit, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, and Dongyan Xu. "Evading Voltage-Based Intrusion Detection on Automotive CAN." In Network and Distributed System Security Symposium. Reston, VA: Internet Society, 2021. http://dx.doi.org/10.14722/ndss.2021.23013.
Full textReports on the topic "Network security intrusion detection"
Ye, Nong. Computer Network Equipment for Intrusion Detection Research. Fort Belvoir, VA: Defense Technical Information Center, March 2000. http://dx.doi.org/10.21236/ada381649.
Full textZage, Dolores M., and Wayne M. Zage. Intrusion Detection System Visualization of Network Alerts. Fort Belvoir, VA: Defense Technical Information Center, July 2010. http://dx.doi.org/10.21236/ada532723.
Full textMcLain, C. D., A. Studer, and R. P. Lippmann. Making Network Intrusion Detection Work With IPsec. Fort Belvoir, VA: Defense Technical Information Center, May 2007. http://dx.doi.org/10.21236/ada468587.
Full textHeady, R., G. Luger, A. Maccabe, and M. Servilla. The architecture of a network level intrusion detection system. Office of Scientific and Technical Information (OSTI), August 1990. http://dx.doi.org/10.2172/425295.
Full textGrosskopf, Michael John. Aligning Time Series for Cyber-Physical Network Intrusion Detection. Office of Scientific and Technical Information (OSTI), August 2015. http://dx.doi.org/10.2172/1212612.
Full textChen, Yan. HPNAIDM: The High-Performance Network Anomaly/Intrusion Detection and Mitigation System. Office of Scientific and Technical Information (OSTI), December 2013. http://dx.doi.org/10.2172/1108982.
Full textSmith, Sidney C., Kin W. Wong, II Hammell, Mateo Robert J., and Carlos J. An Experimental Exploration of the Impact of Network-Level Packet Loss on Network Intrusion Detection. Fort Belvoir, VA: Defense Technical Information Center, August 2015. http://dx.doi.org/10.21236/ada623474.
Full textZhang, Pengchu C., and Nancy Ann Durgin. Profile-based adaptive anomaly detection for network security. Office of Scientific and Technical Information (OSTI), November 2005. http://dx.doi.org/10.2172/875979.
Full textHeady, R., G. F. Luger, A. B. Maccabe, M. Servilla, and J. Sturtevant. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11. Office of Scientific and Technical Information (OSTI), May 1991. http://dx.doi.org/10.2172/425286.
Full text