2009
DOI: 10.1016/j.jnca.2009.05.004
|View full text |Cite
|
Sign up to set email alerts
|

A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 106 publications
(37 citation statements)
references
References 26 publications
0
37
0
Order By: Relevance
“…Hidden Markov models (HMMs) have also been applied for intrusion detection [23,27,29]. However, modeling the system calls alone may not always provide accurate classification as in such cases various connection level features are ignored.…”
Section: Related Workmentioning
confidence: 99%
“…Hidden Markov models (HMMs) have also been applied for intrusion detection [23,27,29]. However, modeling the system calls alone may not always provide accurate classification as in such cases various connection level features are ignored.…”
Section: Related Workmentioning
confidence: 99%
“…It can reliably detect UDP flooding attacks with traffic intensity as low as five to ten percent of the background intensity. Hoang et al [8 ] has proposed a fuzzy based scheme for the integration of HMM ano maly intrusion detection engine and normal-sequence database detection engine for program anomaly intrusion detection using system calls. Experimental design of the proposed method was based on the detection rate and the false positive rate.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…The Performance of the proposed approach is measured using the KDD cup dataset and it achieves high detection rate and low false alarm rates. Hoang X D et al [27] has proposed a program-based anomaly detection scheme using mu ltip le detection engines and fuzzy inference. The performance of the proposed method was evaluated using HMM training cost, false positive rate, anomaly signals and the detection rate.…”
Section: Powers S T Et Al [24]mentioning
confidence: 99%
“…The objectives of developing the IDS are: (1) to monitor the activities of a given environment, and (2) to decide whether the activities are malicious or normal, depending on the integrity of the system and on the confidentiality and the information resources availability [3,16]. The following issues should be considered when building the IDS: (1) data collection, (2) data preprocessing, (3) intrusion recognition, Remove A i from DB_Alerts 23) Next I 24) }…”
Section: Reduction Ids Alert Processes Model (Rapm)mentioning
confidence: 99%