Rule Generalisation in Intrusion Detection Systems using Snort
Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks, and are becoming more and more necessary as reliance on Internet services increases and systems with sensitive data are more commonly open to Internet access. An IDS’s responsibility is to d...
| Main Authors: | Aickelin, Uwe, Twycross, Jamie, Hesketh-Roberts, Thomas |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Inderscience
2007
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/569/ |
Similar Items
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Detecting anomalous process behaviour using second generation Artificial Immune Systems
by: Twycross, Jamie, et al.
Published: (2010)
by: Twycross, Jamie, et al.
Published: (2010)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017)
by: Skarth-Hayley, Luke
Published: (2017)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
Integrating real-time analysis with the dendritic cell algorithm through segmentation
by: Gu, Feng, et al.
Published: (2009)
by: Gu, Feng, et al.
Published: (2009)
Avoiding the Problem: A study on the generalisation of avoidance behaviour
by: Fisher, Courteney Tiegan Louise
Published: (2025)
by: Fisher, Courteney Tiegan Louise
Published: (2025)
The relationships between perfectionism, pathological worry and generalised anxiety disorder
by: Handley, Alicia, et al.
Published: (2014)
by: Handley, Alicia, et al.
Published: (2014)
Optimising rule-based classification in temporal data
by: Fattah, Polla, et al.
Published: (2016)
by: Fattah, Polla, et al.
Published: (2016)
An improved system for sentence-level novelty detection in textual streams
by: Fu, Xinyu, et al.
Published: (2016)
by: Fu, Xinyu, et al.
Published: (2016)
Development of a Saltwater Intrusion Software Using Visual Basic
by: Tan, Chiau Siang
Published: (2001)
by: Tan, Chiau Siang
Published: (2001)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Human-like rule optimization for continuous domains
by: Hadzic, Fedja, et al.
Published: (2008)
by: Hadzic, Fedja, et al.
Published: (2008)
A signature based intrusion detection system (IDS) : using snort / Nik Mariza Nik Abdul Malik
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
by: Nik Abdul Malik, Nik Mariza
Published: (2004)
Rule optimizing technique motivated by human concept formation
by: Hadzic, Fedja, et al.
Published: (2008)
by: Hadzic, Fedja, et al.
Published: (2008)
Ascertaining data mining rules using statistical approaches
by: Mohd Shaharanee, I., et al.
Published: (2009)
by: Mohd Shaharanee, I., et al.
Published: (2009)
Interestingness of association rules using symmetrical tau and logistic regression
by: Mohd Shaharanee, Izwan, et al.
Published: (2009)
by: Mohd Shaharanee, Izwan, et al.
Published: (2009)
The Development of the Business Rules Diagram
by: McDermid, Donald
Published: (1998)
by: McDermid, Donald
Published: (1998)
An Ordered Generalised Extreme Value Model with Application to Alcohol Consumption in Australia
by: Harris, Mark, et al.
Published: (2006)
by: Harris, Mark, et al.
Published: (2006)
Effective dimensionality reduction of payload-based anomaly detection in TMAD model for HTTP payload
by: Kakavand, Mohsen, et al.
Published: (2016)
by: Kakavand, Mohsen, et al.
Published: (2016)
A Statistical Interestingness Measures for XML based Association Rules
by: Mohd Shaharanee, Izwan, et al.
Published: (2010)
by: Mohd Shaharanee, Izwan, et al.
Published: (2010)
Generalised path-following for well-behaved nonlinear structures
by: Groh, R.M.J., et al.
Published: (2018)
by: Groh, R.M.J., et al.
Published: (2018)
Defying gravity: defining the international rule of law
by: McCorquodale, Robert
Published: (2016)
by: McCorquodale, Robert
Published: (2016)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Explain the world --- towards leveraging causality in fuzzy rule based systems
by: Zhang, Te
Published: (2025)
by: Zhang, Te
Published: (2025)
Cloud intrusion detection systems: fuzzy logic and classifications
by: Alqahtani, Saeed Masaud H.
Published: (2017)
by: Alqahtani, Saeed Masaud H.
Published: (2017)
Similar Items
-
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007) -
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016) -
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
by: Bakhdlaghi, Yousef Abdullah
Published: (2020)