skip to main content
article
Free access

Analysis of active intrusion prevention data for predicting hostile activity in computer networks

Published: 01 April 2007 Publication History

Abstract

Using a generic and reliable model to anticipate future attack scenarios.

References

[1]
Carnegie Mellon Software Engineering Institute: Research and Trends, 2003; www.cert.org/nav/index_purple.html.
[2]
Denning, D.E. An intrusion-detection model. IEEE Transactions on Software Engineering 13, 2 (Feb. 1987), 222--232.
[3]
Desai, M.S., Richards, T.C., and von der Embse, T. System insecurity---firewalls. Information Management and Computer Security 10, 3 (2002), 135--139.
[4]
Elson, D. Intrusion Detection, Theory and Practice, 2001; www.securityfocus.com/focus/ids/articles/davidelson.html.
[5]
Haines, J., Kewley, R.D., Tinnel, L., and Taylor, S. Validation of sensor alert correlators. IEEE Security and Privacy Magazine 1, 1 (Jan.--Feb. 2003), 46--56.
[6]
Internet Storm Center: Trends; isc.incidents.org/trends.html.
[7]
Julisch, K. and Dacier, M. Mining intrusion detection alarms for actionable knowledge. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (July 2002), 263--270.
[8]
Know Your Enemy: Statistics; www.honeynet.org/papers/stats/.
[9]
Lee, W., Stolfo, S.J., and Mok, K. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy.
[10]
McHugh, J., Christie, A., and Allen, J. Defending yourself: The role of intrusion detection systems. IEEE Software 17, 5 (Sept.--Oct. 2000), 42--51.
[11]
Mukherjee, B., Heberlein, L.T., and Levitt, K.N. Network intrusion detection. IEEE Network 8, 3 (May--June 1994), 26--41.
[12]
Power, R. The 2002 CSI/FBI computer crime and security survey. Computer Security Issues and Trends 8, 1 (Spring 2002), 1--33.

Cited By

View all
  • (2024)PREVIR: Fortifying Vehicular Networks Against Denial of Service AttacksIEEE Access10.1109/ACCESS.2024.338299212(48301-48320)Online publication date: 2024
  • (2016)Impact of Introducing Domain-Specific Modelling in Software Maintenance: An Industrial Case StudyIEEE Transactions on Software Engineering10.1109/TSE.2015.247922142:3(245-260)Online publication date: 1-Mar-2016
  • (2016)An adaptive algorithm for detecting and preventing attacks in telecommunication networks2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T)10.1109/INFOCOMMST.2016.7905373(175-177)Online publication date: Oct-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 50, Issue 4
April 2007
86 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1232743
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2007
Published in CACM Volume 50, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)214
  • Downloads (Last 6 weeks)47
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)PREVIR: Fortifying Vehicular Networks Against Denial of Service AttacksIEEE Access10.1109/ACCESS.2024.338299212(48301-48320)Online publication date: 2024
  • (2016)Impact of Introducing Domain-Specific Modelling in Software Maintenance: An Industrial Case StudyIEEE Transactions on Software Engineering10.1109/TSE.2015.247922142:3(245-260)Online publication date: 1-Mar-2016
  • (2016)An adaptive algorithm for detecting and preventing attacks in telecommunication networks2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T)10.1109/INFOCOMMST.2016.7905373(175-177)Online publication date: Oct-2016
  • (2013)Hacking-Vigilance Distribution with Application to Assess Cyber Insecurity LevelInternational Journal of Information and Education Technology10.7763/IJIET.2013.V3.285(300-303)Online publication date: 2013
  • (2013)Adversarial attacks against intrusion detection systemsInformation Sciences: an International Journal10.1016/j.ins.2013.03.022239(201-225)Online publication date: 1-Aug-2013
  • (2010)Goals and Practices in Maintaining Information Systems SecurityInternational Journal of Information Security and Privacy10.4018/jisp.20100701034:3(40-50)Online publication date: 1-Jul-2010
  • (2010)Internet Sensor Grid: Experiences with Passive and Active InstrumentsCommunications: Wireless in Developing Countries and Networks of the Future10.1007/978-3-642-15476-8_14(132-145)Online publication date: 2010
  • (2008)Increasing SIP firewall performance by ruleset size limitation2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications10.1109/PIMRC.2008.4699868(1-6)Online publication date: Sep-2008
  • (2008)LDLB: A light intrusion prevention system in data link layer2008 2nd International Conference on Anti-counterfeiting, Security and Identification10.1109/IWASID.2008.4688372(190-193)Online publication date: Aug-2008
  • (2007)Intrusion detection using the chi-square goodness-of-fit test for information assurance, network, forensics and software securityJournal of Computing Sciences in Colleges10.5555/1289280.128932923:1(255-263)Online publication date: 1-Oct-2007

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media