A hybrid intrusion detection and visualization system

@article{Peng2006AHI,
  title={A hybrid intrusion detection and visualization system},
  author={Jianfeng Peng and Chuan Feng and Jerzy W. Rozenblit},
  journal={13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)},
  year={2006},
  pages={2 pp.-506}
}
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large proportion of these networks. Unauthorized accesses and misuse of critical data can be catastrophic to businesses, emergency services, and even threaten the defense and security of a nation. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. This paper proposes a… CONTINUE READING

Figures and Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 10 REFERENCES

Theoretical basis for intrusion detection

  • Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop
  • 2005

Fuzzy feature extraction and visualization for intrusion detection

  • The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03.
  • 2003

TJIDS: an intrusion detection architecture for distributed network

  • CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436)
  • 2003

A data mining framework for building intrusion detection models

  • Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344)
  • 1999

Attack Trends 2004 and 2005 ” , Counterpane Internet Security Inc

Leandro N de Castro, J. Timmis
  • Artificial Immune Systems : A Novel Paradigm to Pattern Recognition ” , Artificial Neural Networks in Pattern Recognition Proceedings of the 18 th National Information Security Conference

Similar Papers

Loading similar papers…