Skip to search formSkip to main contentSkip to account menu

Intrusion detection system

Known as: Need of intrusion detection system, Network intrusion-detection system, Intrusion detection and prevention system 
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2002
Review
2002
This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research… 
Highly Cited
2001
Highly Cited
2001
This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection… 
Highly Cited
2000
Highly Cited
2000
In 1998 and again in 1999, the Lincoln Laboratory of MIT conducted a comparative evaluation of intrusion detection systems (IDSs… 
Highly Cited
2000
Highly Cited
2000
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs… 
Highly Cited
2000
Highly Cited
2000
An intrusion detection evaluation test bed was developed which generated normal traffic similar to that on a government site… 
Highly Cited
1999
Highly Cited
1999
Network intrusion detection systems (NIDS) are an important part of any network security architecture. They provide a layer of… 
Highly Cited
1998
Highly Cited
1998
A method is introduced for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of… 
Review
1998
Review
1998
In this paper we discuss our research in developing general and systematic methods for intrusion detection. The key ideas are to… 
Review
1994
Review
1994
Intrusion detection is a new, retrofit approach for providing a sense of security in existing computers and data networks, while… 
Highly Cited
1987
Highly Cited
1987
  • D. Denning
  • IEEE Transactions on Software Engineering
  • 1987
  • Corpus ID: 10028835
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of…