Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

New Jersey Institute of Technology

Intrusion detection

Publication Year
Publication

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan May 2005

Security Information Management With Frame-Based Attack Presentation And First-Order Reasoning, Wei Yan

Dissertations

Internet has grown by several orders of magnitude in recent years, and this growth has escalated the importance of computer security. Intrusion Detection System (IDS) is used to protect computer networks. However, the overwhelming flow of log data generated by IDS hamper security administrators from uncovering new insights and hidden attack scenarios. Security Information Management (SIM) is a new growing area of interest for intrusion detection. The research work in this dissertation explores the semantics of attack behaviors and designs Frame-based Attack Representation and First-order logic Automatic Reasoning (FAR-FAR) using linguistics and First-order Logic (FOL) based approaches. Techniques based on …


Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj Jan 2002

Introduction On Intrusion Detection Systems : Focus On Hierarchical Analysis, Ratna Bajaj

Theses

In today's fast paced computing world security is a main concern. Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This paper will examine various intrusion detection systems. The task of intrusion detection is to monitor usage of a system and detect and malicious activity, therefore, the architecture is a key component when studying intrusion detection systems. This thesis will also analyze various neural networks for statistical anomaly intrusion detection systems. The thesis will focus on the Hierarchical Intrusion Detection system (HIDE) architecture. The HIDE system detects network based attack as anomalies …