Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,996,054 papers from all fields of science
Search
Sign In
Create Free Account
Anomaly-based intrusion detection system
An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Artificial intelligence
CFEngine
Data mining
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
SCADA Networks Anomaly-based Intrusion Detection System
Abdulaziz Almehmadi
International Conference on Security of…
2018
Corpus ID: 53475868
Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by…
Expand
2017
2017
HA-IDS: A heterogeneous anomaly-based intrusion detection system
Chau Tran
,
Tran Nguyen Vo
,
T. N. Thinh
4th NAFOSTED Conference on Information and…
2017
Corpus ID: 22949636
In this research, we propose a heterogeneous anomaly-based intrusion detection system (HA-IDS) which is built on both of Field…
Expand
2015
2015
A genetic clustering technique for Anomaly-based Intrusion Detection Systems
Naila Belhadj Aissa
,
M. Guerroumi
Software Engineering, Artificial Intelligence…
2015
Corpus ID: 15252538
The Security of network resources, computer systems and data has become a great issue resulting from the advent of the internet…
Expand
Review
2012
Review
2012
Methodologies for detecting DoS/DDoS attacks against network servers
M. Alenezi
,
M. Reed
International Conference on Systems and Networks…
2012
Corpus ID: 61622792
As denial of service (DoS) attacks are becoming more common in the Internet, there is greater need for solutions to overcome…
Expand
Highly Cited
2011
Highly Cited
2011
Anomaly-based intrusion detection in software as a service
G. Nascimento
,
M. Correia
IEEE/IFIP 41st International Conference on…
2011
Corpus ID: 15409194
Anomaly-based intrusion detection systems (IDS) have the ability of detecting previously unknown attacks, which is important…
Expand
2009
2009
Application Data Consistency Checking for Anomaly Based Intrusion Detection
Olivier Sarrouy
,
Eric Totel
,
Bernard Jouga
Safety-critical Systems Symposium
2009
Corpus ID: 37623997
Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems…
Expand
2008
2008
On optimizing load balancing of intrusion detection and prevention systems
A. Le
,
E. Al-Shaer
,
R. Boutaba
,
D. Cheriton
IEEE INFOCOM Workshops
2008
Corpus ID: 15733004
In large-scale enterprise networks, multiple network intrusion detection and prevention systems are used to provide high quality…
Expand
2008
2008
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)
Nathalie Dagorn
International Symposium on Recent Advances in…
2008
Corpus ID: 39607525
This paper presents WebIDS, a learning-based anomaly detection system for Web applications aiming at improving the decision…
Expand
2006
2006
Approaches in anomaly-based intrusion detection systems
Damiano Bolzoni
,
S. Etalle
2006
Corpus ID: 5031132
Anomaly-based network intrusion detection systems can take into consideration packet headers, the payload, or a combination of…
Expand
2005
2005
Distributed Anomaly-based Intrusion Detection System
J. Gyimesi
2005
Corpus ID: 17533700
Intrusion Detection Systems (IDS) are software or hardware systems, which automatically monitor network traffic looking for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE