Intrusion detection system

Known as: Need of intrusion detection system, Network intrusion-detection system, Intrusion detection and prevention system 
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2003
Highly Cited
2003
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We examine several host-based anomaly detection systems and study their security against evasion attacks. First, we introduce the… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs… (More)
  • table I
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table IV
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of… (More)
  • figure 3
  • figure 8
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in… (More)
  • figure V
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
There is widespread concern that large-scale malicious attacks on computer networks could cause serious disruption to network… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1986
Highly Cited
1986
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of… (More)
  • figure 5-1
Is this relevant?