An Intrusion-Detection Model

  title={An Intrusion-Detection Model},
  author={D. Denning},
  journal={IEEE Transactions on Software Engineering},
  • D. Denning
  • Published 1987
  • Computer Science
  • IEEE Transactions on Software Engineering
  • A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. [...] Key Method The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability…Expand Abstract
    A sense of self for Unix processes
    • 1,971
    • PDF
    Network intrusion detection
    • 1,073
    Intrusion Detection Using Sequences of System Calls
    • 1,339
    • PDF
    Towards a taxonomy of intrusion-detection systems
    • 833
    • PDF
    Feature deduction and ensemble design of intrusion detection systems
    • 591
    • PDF
    An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • 1,270
    • PDF
    Intrusion detection via static analysis
    • 746
    • PDF
    Outside the Closed World: On Using Machine Learning for Network Intrusion Detection
    • 1,015
    • PDF


    Publications referenced by this paper.