Proceedings of the Fifth International Conference on Information Fusion. FUSION 2002. (IEEE Cat.No.02EX5997)
DOI: 10.1109/icif.2002.1020933
|View full text |Cite
|
Sign up to set email alerts
|

A case-based approach to network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 2 publications
0
4
0
1
Order By: Relevance
“…Efforts to deal with this issue have nonetheless been explored using artificial intelligence techniques. In particular, Chavan et al 3 use neural networks and a fuzzy inference system, and Schwartz et al 22 briefly discuss the possibility of improving the efficacy of Snort through shifting from a rule-based to a case-based reasoning system. The present paper is an outgrowth from the latter work.…”
Section: Related Workmentioning
confidence: 99%
“…Efforts to deal with this issue have nonetheless been explored using artificial intelligence techniques. In particular, Chavan et al 3 use neural networks and a fuzzy inference system, and Schwartz et al 22 briefly discuss the possibility of improving the efficacy of Snort through shifting from a rule-based to a case-based reasoning system. The present paper is an outgrowth from the latter work.…”
Section: Related Workmentioning
confidence: 99%
“…In the defense in-depth strategy, firewalls and intrusion detection systems (IDSs) are considered as the first and the second lines of defense respectively [18]. A proof of concept implementation of an SMS-bot, which has the same role as a firewall, is presented in [19].…”
Section: B From the Kill Zone To The Third Line Of Defensementioning
confidence: 99%
“…Based on IDS [3] and active network [4] ideas, it has MAC address, IP address and Port types besides traditional Byte, Word and Integer types. Programmers can define the IP variables and compare or assign its value, don't care it is Big-endian or Little-endian.…”
Section: Network Oriented Featuresmentioning
confidence: 99%