Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt

@inproceedings{Noel2002ModernID,
  title={Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt},
  author={Steven Noel and Duminda Wijesekera},
  year={2002}
}
This chapter examines the state of modern intrusion detection, with a particular emphasis on the emerging approach of data mining. The discussion paralleIs two important aspects of intrusion detection: general detection strategy (misuse detection versus anomaly detection) and data source (individual hosts versus network trafik). Misuse detection attempts to match known patterns of intrusion , while anomaly detection searches for deviations from normal behavior . Between the two approaches, only… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 51 CITATIONS, ESTIMATED 21% COVERAGE

51 Citations

0246'03'06'10'14'18
Citations per Year
Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
SHOWING 1-10 OF 69 REFERENCES

A real time intrusion detection expert system (ides)

  • T. Lunt, A. Tamaru, +6 authors T. D. Garvey
  • Technical report, SRI.
  • 1992
Highly Influential
3 Excerpts

Audit Data Analysis and Mining

  • N. Wu
  • PhD thesis, George Mason University, Department…
  • 2001
3 Excerpts

Similar Papers

Loading similar papers…