Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

An introduction to intrusion detection

Published: 01 April 1996 Publication History

Abstract

No abstract available.

References

[1]
1. J.P Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P Anderson Co., Fort Washington, Pennsylvania, April 1980.
[2]
2. Mark Crosbie and Eugene Spafford. Defending a Computer System Using Autonomous Agents. Technical Report CSD-TR-95-022, Department of Computer Sciences, Purdue University, 1995.
[3]
3. Dorothy E Denning. An Intrusion Detection Model. In IEEE Transactions on Software Engineering, Number 2, page 222, February 1987.
[4]
4. T D Garvey and Teresa F Lunt. Model based intrusion detection. In Proceedings of the 14th National Computer Security Conference, pages 372-385, October 1991.
[5]
5. Koral Ilgun. USTAT - A Real-time Intrusion Detection System for UNIX. Master's Thesis, University of California at Santa Barbara, November 1992.
[6]
6. Sandeep Kumar. Classification and Detection of Computer Intrusions. Ph.D. Dissertation, August 1995.
[7]
7. Teresa F Lunt. Detecting Intruders in Computer Systems. Conference on Auditing and Computer Technology, 1993.
[8]
8. Teresa F Lunt. A survey of intrusion detection techniques. In Computers and Security, 12(1993), pages 405-418.
[9]
9. Biswanath Mukherjee, L Todd Heberlein and Karl N Levitt. Network Intrusion Detection, IEEE Network, May/June 1994, pages 26-41.
[10]
10. Barton P Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, Jeff Steidl. Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services. Computer Sciences Department, University of Wisconsin, 1995.
[11]
11. Steven E Smaha. Haystack: An Intrusion Detection System. In Fourth Aerospace Computer Security Applications Conference, pages 37-44, Tracor Applied Science Inc., Austin, Texas, December 1988.
[12]
12. Eugene H Spafford. The Internet Worm Program: An Analysis. In ACM Computer Communication Review; 19(1), pages 17-57, Jan 1989.
[13]
13. Eugene H Spafford. Security Seminar, Department of Computer Sciences, Purdue University, Jan 1996.
[14]
14. Henry S Teng, Kaihu Chen and Stephen C Lu. Security Audit Trail Analysis Using Inductively Generated Predictive Rules. In Proceedings of the 11th National Conference on Artificial Intelligence Applications, pages 24-29, IEEE, IEEE Service Center, Piscataway, NJ, March 1990.

Cited By

View all
  • (2024)ShNFN: Shepard Neuro-Fuzzy Network for Intrusion Detection in Fog ComputingInternational Journal of Pattern Recognition and Artificial Intelligence10.1142/S021800142450018638:13Online publication date: 16-Oct-2024
  • (2024)From Concept to Prototype: Developing and Testing GAAINet for Industrial IoT Intrusion DetectionIntelligent Information Processing XII10.1007/978-3-031-57808-3_33(453-468)Online publication date: 6-Apr-2024
  • (2023)Assessment of Security KPIs for 5G Network Slices for Special Groups of SubscribersBig Data and Cognitive Computing10.3390/bdcc70401697:4(169)Online publication date: 26-Oct-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image XRDS: Crossroads, The ACM Magazine for Students
XRDS: Crossroads, The ACM Magazine for Students  Volume 2, Issue 4
Special issue on computer security
March 1996
24 pages
ISSN:1528-4972
EISSN:1528-4980
DOI:10.1145/332159
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 1996
Published in XRDS Volume 2, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)ShNFN: Shepard Neuro-Fuzzy Network for Intrusion Detection in Fog ComputingInternational Journal of Pattern Recognition and Artificial Intelligence10.1142/S021800142450018638:13Online publication date: 16-Oct-2024
  • (2024)From Concept to Prototype: Developing and Testing GAAINet for Industrial IoT Intrusion DetectionIntelligent Information Processing XII10.1007/978-3-031-57808-3_33(453-468)Online publication date: 6-Apr-2024
  • (2023)Assessment of Security KPIs for 5G Network Slices for Special Groups of SubscribersBig Data and Cognitive Computing10.3390/bdcc70401697:4(169)Online publication date: 26-Oct-2023
  • (2023)Veri setine uygulanan ön işlemler ile makine öğrenimi yöntemi kullanılarak geliştirilen saldırı tespit modellerinin performanslarının arttırılmasıGazi Üniversitesi Mühendislik Mimarlık Fakültesi Dergisi10.17341/gazimmfd.112202139:2(679-692)Online publication date: 30-Nov-2023
  • (2023)Reliability and Performance of the Online Literature Database CAMbase after Changing from a Semantic Search to a Score Ranking AlgorithmSN Computer Science10.1007/s42979-023-02146-94:5Online publication date: 9-Sep-2023
  • (2022)SVM Based Intrusion Detection Method with Nonlinear Scaling and Feature SelectionIEICE Transactions on Information and Systems10.1587/transinf.2021EDP7184E105.D:5(1024-1038)Online publication date: 1-May-2022
  • (2022)Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior AttributeComputers & Security10.1016/j.cose.2022.102867121(102867)Online publication date: Oct-2022
  • (2022)Real-time application of OPF-based classifier in Snort IDSOptimum-Path Forest10.1016/B978-0-12-822688-9.00011-6(55-93)Online publication date: 2022
  • (2021)Visualization Technique for Intrusion DetectionResearch Anthology on Combating Denial-of-Service Attacks10.4018/978-1-7998-5348-0.ch009(168-182)Online publication date: 2021
  • (2021)Block Chain-based access control and intrusion detection system in IoD2021 6th International Conference on Communication and Electronics Systems (ICCES)10.1109/ICCES51350.2021.9488948(511-518)Online publication date: 8-Jul-2021
  • Show More Cited By

View Options

View options

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media