Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 209,973,139 papers from all fields of science
Search
Sign In
Create Free Account
Intrusion detection system
Known as:
Need of intrusion detection system
, Network intrusion-detection system
, Intrusion detection and prevention system
Expand
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ACARM
ACARM-ng
Aanval
Address space layout randomization
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2002
Review
2002
Intrusion Detection Systems: A Survey and Taxonomy
Stefan Axelsson
2002
Corpus ID: 1609389
This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research…
Expand
Highly Cited
2001
Highly Cited
2001
Aggregation and Correlation of Intrusion-Detection Alerts
Hervé Debar
,
A. Wespi
International Symposium on Recent Advances in…
2001
Corpus ID: 8484541
This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection…
Expand
Highly Cited
2000
Highly Cited
2000
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
J. McHugh
TSEC
2000
Corpus ID: 16748785
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs…
Expand
Highly Cited
2000
Highly Cited
2000
A framework for constructing features and models for intrusion detection systems
Wenke Lee
,
S. Stolfo
TSEC
2000
Corpus ID: 2157536
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs…
Expand
Highly Cited
2000
Highly Cited
2000
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation
R. Lippmann
,
D. Fried
,
+8 authors
M. Zissman
Proceedings DARPA Information Survivability…
2000
Corpus ID: 1388344
An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site…
Expand
Highly Cited
1999
Highly Cited
1999
Snort: Lightweight Intrusion Detection for Networks
M. Roesch
LiSA
1999
Corpus ID: 6673399
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of…
Expand
Highly Cited
1998
Highly Cited
1998
Intrusion Detection Using Sequences of System Calls
S. Hofmeyr
,
S. Forrest
,
Anil Somayaji
Journal of computing and security
1998
Corpus ID: 1666274
A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of…
Expand
Review
1998
Review
1998
Data Mining Approaches for Intrusion Detection
Wenke Lee
,
S. Stolfo
USENIX Security Symposium
1998
Corpus ID: 10631594
In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to…
Expand
Review
1994
Review
1994
Network intrusion detection
B. Mukherjee
,
Todd L. Heberlein
,
K. Levitt
IEEE Network
1994
Corpus ID: 18668597
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while…
Expand
Highly Cited
1987
Highly Cited
1987
An Intrusion-Detection Model
D. Denning
IEEE Transactions on Software Engineering
1987
Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE