A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions

  title={A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions},
  author={Wenke Lee and Rahul A. Nimbalkar and Kam K. Yee and Sunil B. Patil and Pragneshkumar H. Desai and Thuan T. Tran and Salvatore J. Stolfo},
  booktitle={Recent Advances in Intrusion Detection},
As the recent distributed Denial-of-Service (DDOS) attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. Furthermore, intrusion detection systems (IDSs) need to be updated timely whenever a novel intrusion surfaces; and geographically distributed IDSs need to cooperate to detect distributed and coordinated intrusions. In this paper, we describe an experimental system, based on the Common Intrusion Detection Framework (CIDF), where multiple… CONTINUE READING
Highly Cited
This paper has 83 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.
55 Citations
15 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 55 extracted citations

84 Citations

Citations per Year
Semantic Scholar estimates that this publication has 84 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 15 references

The common intrusion speci cation language: A retrospective

  • B. Tung
  • In Pro ceedings of the 2000 DARPA Information…
  • 2000
Highly Influential
7 Excerpts

A real-time intrusion detection expert system (IDES) nal technical report

  • T. Lunt, A. Tamaru, +5 authors T. Garvey
  • Technical report,
  • 1992
Highly Influential
3 Excerpts

S-expressions. Internet-Draft draft-rivest-sexp-00.txt

  • R. Rivest
  • 1997
1 Excerpt

Similar Papers

Loading similar papers…