Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 12
Page No. 733 - 738

Heuristic Based Hybrid Network Intrusion Detection System: A Novel Approach

Authors : N. Priya and S. Vasantha


Ahmed, A.A.E. and L. Traore, 2005. Anomaly intrusion detection based on biometrics. Proceedings of the 6th Annual IEEE SMC Information Assurance Workshop, June 15-17, 2005, West Point, New York, USA., pp: 452-453.

Cannady, J. and J. Harrell, 1996. A comparative analysis of current intrusion detection technologies. Proceeding of the 4th Technology for Information Security Conference, May 13-16, 1996, Houston, TX., USA., pp: 1-17.

Chandola, V., A. Banerjee and V. Kumar, 2009. Anomaly detection: A survey. ACM Comput. Surv., Vol. 41, No. 3. 10.1145/1541880.1541882

Debar, H., M. Dacier and A. Wespi, 1999. Towards a taxonomy of intrusion-detection systems. Comput. Networks, 31: 805-822.
CrossRef  |  Direct Link  |  

Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef  |  

Escamilla, T., 1998. Intrusion Detection: Network Security beyond the Firewall. John Wiley and Sons, New York, USA., ISBN-13: 9780471290001, Pages: 368.

Hu, J., X. Yu, D. Qiu and H.H. Chen, 2009. A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection. IEEE Network, 23: 42-47.
CrossRef  |  

Khan, L., M. Awad and B. Thuraisingham, 2007. A new intrusion detection system using support vector machines and hierarchical clustering. VLDB J., 16: 507-521.
CrossRef  |  Direct Link  |  

Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.

Lunt, T. and R. Jagannathan, 1988. A prototype real-time intrusion detection expert system. Proceeding of the IEEE Symposium on Security and Privacy, April 18-21, 1988, Oakland, CA., USA., pp: 59-66.

Nakkeeran, R., T.A. Albert and R. Ezumalai, 2010. Agent based efficient anomaly intrusion detection system in adhoc networks. IACSIT Int. J. Eng. Technol., 2: 52-56.
Direct Link  |  

Patcha, A. and J.M. Park, 2007. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51: 3448-3470.
CrossRef  |  

Pei, J., S.J. Upadhyaya, F. Farooq and V. Govindaraju, 2004. Data mining for intrusion detection: Techniques, applications and systems. Proceedings of the 20th International Conference on Data Engineering, March 30-April 2, 2004, Boston, MA., USA -.

Porras, P.A. and A. Valdes, 1998. Live traffic analysis of TCP/IP gateways. Proceedings of the Network and Distributed System Security Symposium, March 11-13, 1998, San Diego, CA., USA., pp: 1-13.

Qayyum, A., M.H. Islam and M. Jamil, 2005. Taxonomy of statistical based anomaly detection techniques for intrusion detection. Proceedings of the IEEE Symposium on Emerging Technologies, September 17-18, 2005, Islamabad, Pakistan, pp: 270-276.

Wang, K. and S.J. Stolfo, 2004. Anomalous payload-based network intrusion detection. Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection, September 15-17, 2004, Sophia Antipolis, France, pp: 203-222.

Ye, N., S.M. Erman, Q. Chen and S. Vilbert, 2002. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput., 51: 810-820.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2022 All Rights Reserved