메뉴 건너뛰기




Volumn 36, Issue 1, 2013, Pages 16-24

Intrusion detection system: A comprehensive review

Author keywords

Anomaly; Intrusion detection; Misuse

Indexed keywords

ANOMALY; COMPUTATIONAL POWER; INTRUSION DETECTION SYSTEMS; MISUSE; NETWORK THROUGHPUT; SECURITY THREATS;

EID: 84870713037     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2012.09.004     Document Type: Review
Times cited : (1240)

References (75)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • AV Aho, and MJ Corasick Efficient string matching: an aid to bibliographic search Communications of the ACM 18 1975 333 340
    • (1975) Communications of the ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 2
    • 84866000333 scopus 로고    scopus 로고
    • Bees algorithm for feature selection in network anomaly detection
    • O Alomari, and ZA Othman Bees algorithm for feature selection in network anomaly detection Journal of Applied Sciences Research 8 2012 1748 1756
    • (2012) Journal of Applied Sciences Research , vol.8 , pp. 1748-1756
    • Alomari, O.1    Othman, Z.A.2
  • 4
    • 70350341717 scopus 로고    scopus 로고
    • A survey on intrusion detection in mobile ad hoc networks
    • Y Xiao, X Shen, D-Z Du, Springer-Verlag
    • T Anantvalee, and J Wu A survey on intrusion detection in mobile ad hoc networks Y Xiao, X Shen, D-Z Du, Wireless/mobile network security 2007 Springer-Verlag 170 196
    • (2007) Wireless/mobile Network Security , pp. 170-196
    • Anantvalee, T.1    Wu, J.2
  • 6
    • 0038223829 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST), Technical Report
    • R Bace, P Mell, Intrusion detection systems, National Institute of Standards and Technology (NIST), Technical Report 800-31, 2001.
    • (2001) Intrusion detection systems , pp. 800-831
    • Bace, R.1    Mell, P.2
  • 8
    • 84870720639 scopus 로고    scopus 로고
    • CERT
    • CERT, 〈http://www.cert.org/stats〉
  • 9
    • 14344256540 scopus 로고    scopus 로고
    • On the statistical distribution of processing times in network intrusion detection
    • Paradise Island, Bahamas
    • Cabrera JBD, Gosar J, Lee W, Mehra RK, On the statistical distribution of processing times in network intrusion detection. In: 43rd IEEE conference on decision and control, Paradise Island, Bahamas, 2004, pp. 75-80.
    • (2004) 43rd IEEE Conference on Decision and Control , pp. 75-80
    • Cabrera, J.B.D.1    Gosar, J.2    Lee, W.3    Mehra, R.K.4
  • 11
    • 84863478979 scopus 로고    scopus 로고
    • A hybrid network intrusion detection system using simplified swarm optimization (SSO)
    • YY Chung, and N Wahid A hybrid network intrusion detection system using simplified swarm optimization (SSO) Applied Soft Computing 12 2012 3014 3022
    • (2012) Applied Soft Computing , vol.12 , pp. 3014-3022
    • Chung, Y.Y.1    Wahid, N.2
  • 12
    • 84870702552 scopus 로고    scopus 로고
    • ClamAV
    • ClamAV, 〈http://www.clamav.net〉
  • 13
    • 84857877495 scopus 로고    scopus 로고
    • Real time intrusion prediction based on optimized alerts with hidden Markov model
    • M Couture Real time intrusion prediction based on optimized alerts with hidden Markov model Journal of Networks 7 2012 311 321
    • (2012) Journal of Networks , vol.7 , pp. 311-321
    • Couture, M.1
  • 14
    • 0033293396 scopus 로고    scopus 로고
    • Towards a taxonomy of intrusion detection systems
    • H Debar, M Dacier, and A Wespi Towards a taxonomy of intrusion detection systems Computer Networks 31 1999 805 822
    • (1999) Computer Networks , vol.31 , pp. 805-822
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 18
    • 79960556588 scopus 로고    scopus 로고
    • Alert correlation in collaborative intelligent intrusion detection systems - A survey
    • HT Elshousha, and IM Osmanb Alert correlation in collaborative intelligent intrusion detection systems - a survey Applied Soft Computing 11 2011 4349 4365
    • (2011) Applied Soft Computing , vol.11 , pp. 4349-4365
    • Elshousha, H.T.1    Osmanb, I.M.2
  • 24
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • San Diego, California, USA
    • Garfinkel T, Rosenblum M, A virtual machine introspection based architecture for intrusion detection. In: Network and distributed systems security symposium, San Diego, California, USA, 2003
    • (2003) Network and Distributed Systems Security Symposium
    • Garfinkel, T.1    Rosenblum, M.2
  • 26
    • 84863242123 scopus 로고    scopus 로고
    • Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems
    • C-Y Ho, Y-C Lai, I-W Chen, F-Y Wang, and W-H Tai Statistical analysis of false positives and false negatives from real traffic with intrusion detection/prevention systems IEEE Communications Magazine 50 2012 146 154
    • (2012) IEEE Communications Magazine , vol.50 , pp. 146-154
    • Ho, C.-Y.1    Lai, Y.-C.2    Chen, I.-W.3    Wang, F.-Y.4    Tai, W.-H.5
  • 31
    • 78449293060 scopus 로고    scopus 로고
    • A game-based intrusion detection mechanism to confront internal attackers
    • I Kantzavelou, and S Katsikas A game-based intrusion detection mechanism to confront internal attackers Computers & Security 29 2010 859 874
    • (2010) Computers & Security , vol.29 , pp. 859-874
    • Kantzavelou, I.1    Katsikas, S.2
  • 40
    • 81855197007 scopus 로고    scopus 로고
    • An efficient intrusion detection system based on support vector machines and gradually feature removal method
    • Y Li, J Xia, S Zhang, J Yan, X Ai, and K Dai An efficient intrusion detection system based on support vector machines and gradually feature removal method Expert Systems with Applications 39 2012 424 430
    • (2012) Expert Systems with Applications , vol.39 , pp. 424-430
    • Li, Y.1    Xia, J.2    Zhang, S.3    Yan, J.4    Ai, X.5    Dai, K.6
  • 41
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • TF Lunt A survey of intrusion detection techniques Computers & Security 12 1993 405 418
    • (1993) Computers & Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 46
    • 77249132188 scopus 로고    scopus 로고
    • A survey of network virtualization
    • NMMK Mosharaf, and R Boutaba A survey of network virtualization Computer Networks 54 2010 862 876
    • (2010) Computer Networks , vol.54 , pp. 862-876
    • Mosharaf, N.1    Boutaba, R.2
  • 51
    • 84870715786 scopus 로고    scopus 로고
    • Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks
    • B Paramasivan, and KM Pitchai Comprehensive survey on game theory based intrusion detection system for mobile adhoc networks International Journal of Computing Applications 5 2011 23 29
    • (2011) International Journal of Computing Applications , vol.5 , pp. 23-29
    • Paramasivan, B.1    Pitchai, K.M.2
  • 52
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A Patcha, and JM Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 2007 3448 3470
    • (2007) Computer Networks , vol.51 , pp. 3448-3470
    • Patcha, A.1    Park, J.M.2
  • 58
    • 70450211167 scopus 로고    scopus 로고
    • Improving Snort performance under Linux
    • K Salah, and A Kahtani Improving Snort performance under Linux IET Communications 3 2009 1883 1895
    • (2009) IET Communications , vol.3 , pp. 1883-1895
    • Salah, K.1    Kahtani, A.2
  • 59
    • 70349745178 scopus 로고    scopus 로고
    • Performance evaluation comparison of Snort NIDS under Linux and Windows Server
    • K Salah, and A Kahtani Performance evaluation comparison of Snort NIDS under Linux and Windows Server Journal of Network and Computer Applications 33 2010 6 15
    • (2010) Journal of Network and Computer Applications , vol.33 , pp. 6-15
    • Salah, K.1    Kahtani, A.2
  • 61
    • 80052488466 scopus 로고    scopus 로고
    • Evolutionary computation techniques for intrusion detection in mobile ad hoc networks
    • S Sen, and JA Clark Evolutionary computation techniques for intrusion detection in mobile ad hoc networks Computer Networks 55 2011 3441 3457
    • (2011) Computer Networks , vol.55 , pp. 3441-3457
    • Sen, S.1    Clark, J.A.2
  • 62
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • S Shanbhag, and T Wolf Accurate anomaly detection through parallelism IEEE Network 23 2009 22 28
    • (2009) IEEE Network , vol.23 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 63
    • 80052425981 scopus 로고    scopus 로고
    • Signaling game based strategy of intrusion detection in wireless sensor networks
    • S Shena, Y Li, H Xua, and Q Caoa Signaling game based strategy of intrusion detection in wireless sensor networks Computers & Mathematics with Applications 62 2011 2404 2416
    • (2011) Computers & Mathematics with Applications , vol.62 , pp. 2404-2416
    • Shena, S.1    Li, Y.2    Xua, H.3    Caoa, Q.4
  • 64
    • 84870694115 scopus 로고    scopus 로고
    • Snort
    • Snort, 〈http://www.snort.org〉
  • 70
    • 80052033497 scopus 로고    scopus 로고
    • An integrated intrusion detection system for cluster-based wireless sensor networks
    • SS Wang, KQ Yan, SC Wang, and CW Liu An integrated intrusion detection system for cluster-based wireless sensor networks Expert Systems with Applications 38 2011 15234 15243
    • (2011) Expert Systems with Applications , vol.38 , pp. 15234-15243
    • Wang, S.S.1    Yan, K.Q.2    Wang, S.C.3    Liu, C.W.4
  • 72
    • 79251595976 scopus 로고    scopus 로고
    • A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
    • C Xenakis, C Panos, and I Stavrakakis A comparative evaluation of intrusion detection architectures for mobile ad hoc networks Computers & Security 30 2011 63 80
    • (2011) Computers & Security , vol.30 , pp. 63-80
    • Xenakis, C.1    Panos, C.2    Stavrakakis, I.3
  • 75
    • 73549100005 scopus 로고    scopus 로고
    • The application of virtual machines on system security
    • Yantai, Shandong
    • Zhao S, Chen K, Zheng W, The application of virtual machines on system security. In: Fourth ChinaGrid annual conference, Yantai, Shandong, 2009, pp. 222-229.
    • (2009) Fourth ChinaGrid Annual Conference , pp. 222-229
    • Zhao, S.1    Chen, K.2    Zheng, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.