2003
DOI: 10.1007/978-3-540-24581-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Combining Multiple Host-Based Detectors Using Decision Tree

Abstract: Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of important data, have been raised. In the field of anomaly-based IDS several artificial intelligence techniques are used to model normal behavior. However, there is no perfect detection method so that most of IDSs can detect the limited types of intrusion and suffers from its false alarms. Combining multiple detectors can be a good solution… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The challenges and future directions of intrusion detection technology are evaluated. The techniques discussed in [4], [9] & [14] are sufficient for IDPS to detect and respond to anomalies in real time.…”
Section: Literature Surveymentioning
confidence: 99%
“…The challenges and future directions of intrusion detection technology are evaluated. The techniques discussed in [4], [9] & [14] are sufficient for IDPS to detect and respond to anomalies in real time.…”
Section: Literature Surveymentioning
confidence: 99%
“…A well trained staff and analyst are required to continuously monitoring the system. Still a huge effort is required to construct new security strategies which are discussed in [6], [7], [8].…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper [8] proposed intrusion detection techniques by combining multiple hosts in order to detect multiple intrusions and to reduce false-positive rate. Hidden Markov Model (HMM) is a speech recognition technique that is used for modeling the system call events.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Han et al [9] combined multiple host-based detection models using a decision tree to lower false alert rate with good performance on the detection accuracy. However, their detection models were established on the same layer (i.e., audit events and some related parameters and attributes), although the utilized information was different.…”
Section: Related Workmentioning
confidence: 99%