Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,300 papers from all fields of science
Search
Sign In
Create Free Account
Anomaly-based intrusion detection system
An anomaly-based intrusion detection system, is an intrusion detection system for detecting both network and computer intrusions and misuse by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Artificial intelligence
CFEngine
Data mining
Intrusion detection system
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Hybrid Model for Anomaly-Based Intrusion Detection System
N. Ugtakhbayar
,
B. Usukhbayar
,
S. Baigaltugs
Advances in Intelligent Information Hiding and…
2019
Corpus ID: 199018635
Anomaly-based systems have become critical to the fields of information technology. Since last few years, evolution of anomaly…
Expand
2018
2018
SCADA Networks Anomaly-based Intrusion Detection System
Abdulaziz Almehmadi
International Conference on Security of…
2018
Corpus ID: 53475868
Intentional attacks1 that cause country wide blackouts, gas and water systems malfunction are actions that can be carried out by…
Expand
2017
2017
HA-IDS: A heterogeneous anomaly-based intrusion detection system
Chau Tran
,
Tran Nguyen Vo
,
T. N. Thinh
4th NAFOSTED Conference on Information and…
2017
Corpus ID: 22949636
In this research, we propose a heterogeneous anomaly-based intrusion detection system (HA-IDS) which is built on both of Field…
Expand
2015
2015
A genetic clustering technique for Anomaly-based Intrusion Detection Systems
Naila Belhadj Aissa
,
M. Guerroumi
Software Engineering, Artificial Intelligence…
2015
Corpus ID: 15252538
The Security of network resources, computer systems and data has become a great issue resulting from the advent of the internet…
Expand
Highly Cited
2011
Highly Cited
2011
Anomaly-based intrusion detection in software as a service
G. Nascimento
,
M. Correia
IEEE/IFIP 41st International Conference on…
2011
Corpus ID: 15409194
Anomaly-based intrusion detection systems (IDS) have the ability of detecting previously unknown attacks, which is important…
Expand
2009
2009
Application Data Consistency Checking for Anomaly Based Intrusion Detection
Olivier Sarrouy
,
Eric Totel
,
Bernard Jouga
Safety-critical Systems Symposium
2009
Corpus ID: 37623997
Host-based intrusion detection systems may be coarsely divided into two categories. Misuse-based intrusion detection systems…
Expand
2008
2008
On optimizing load balancing of intrusion detection and prevention systems
A. Le
,
E. Al-Shaer
,
R. Boutaba
,
D. Cheriton
IEEE INFOCOM Workshops
2008
Corpus ID: 15733004
In large-scale enterprise networks, multiple network intrusion detection and prevention systems are used to provide high quality…
Expand
2008
2008
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract)
Nathalie Dagorn
International Symposium on Recent Advances in…
2008
Corpus ID: 39607525
This paper presents WebIDS, a learning-based anomaly detection system for Web applications aiming at improving the decision…
Expand
2007
2007
A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-Based Intrusion Detection System
Jungsuk Song
,
H. Takakura
,
Y. Okabe
,
Yongjin Kwon
International Conference on Database Systems for…
2007
Corpus ID: 30306309
Intrusion detection system(IDS) has played a central role as an appliance to effectively defend our crucial computer systems or…
Expand
2006
2006
Approaches in anomaly-based intrusion detection systems
Damiano Bolzoni
,
S. Etalle
2006
Corpus ID: 5031132
Anomaly-based network intrusion detection systems can take into consideration packet headers, the payload, or a combination of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE