Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Intrusion detection system

Known as: Need of intrusion detection system, Network intrusion-detection system, Intrusion detection and prevention system 
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing… Expand
Review
2002
Review
2002
This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research… Expand
  • table 1
  • table 2
Highly Cited
2001
Highly Cited
2001
This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Highly Cited
2000
Highly Cited
2000
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs… Expand
  • table I
  • figure 1
Highly Cited
1999
Highly Cited
1999
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of… Expand
  • figure 3
  • figure 8
Highly Cited
1999
Highly Cited
1999
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Review
1998
Review
1998
In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Review
1994
Review
1994
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while… Expand
  • figure 1
  • figure 2
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
Highly Cited
1986
Highly Cited
1986
  • D. Denning
  • IEEE Symposium on Security and Privacy
  • 1986
  • Corpus ID: 10713382
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… Expand
  • figure 5-1