Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Day, David; Flores, Denys (2012)
Publisher: Institute of Electrical and Electronics Engineers ( IEEE )
Languages: English
Types: Part of book or chapter of book

Classified by OpenAIRE into

Intrusion Detection Systems are an accepted and very\ud useful option to monitor, and detect malicious activities.\ud However, Intrusion Detection Systems have inherent limitations which lead to false positives and false negatives; we propose that combining signature and anomaly based IDSs should be examined. This paper contrasts signature and anomaly-based IDSs, and critiques some proposals about hybrid IDSs with signature and heuristic capabilities, before considering some of their contributions in order to include them as main features of a new hybrid IDS named CONDOR (COmbined Network intrusion Detection ORientate), which is designed to offer superior pattern analysis and anomaly detection by reducing false positive rates and administrator intervention.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] D.J. Day and Z. Zhao, "Protecting Against Address Space Layout Randomization (ASLR) Compromises and Return-toLibc Attacks Using Network Intrusion Detection Systems.," International Journal of Automation and Computing, vol. 8, no. 4, pp. 472-483, Dec. 2011.
    • [2] W. R. Cheswick, S. M. Bellovin, and A.D. Rubin, "Intrusion Detection," in Firewalls and Internet Security: Repelling the Wily Hacker, 2nd ed. Boston: Addison-Wesley, 2003, pp. 279- 283.
    • [3] Ryan Trost, "Intrusion Detection Systems," in Practical Intrusion Analysis: Prevention and Detection for the TwentyFirst Century, Karen Gettman, Ed. Boston, USA: AddisonWesley, 2010, ch. 3, pp. 53-85.
    • [4] P. M. Mafra, V.Moll, J. da Silva Fraga, and A.O.Santin, "Octopus-IIDS: An Anomaly Based Intelligent Intrusion Detection System," in IEEE Symposium on Computers and Communications, Riccione, Italy, 22-25 June 2010, pp. 405-410.
    • [5] S. Jajodia, Intrusion Detection Systems, R.Di Pietro and L.V. Mancini, Eds. New York, US: Springer, 2008.
    • W.Li, Z.Li, H.Shi, and W.Li, "A Novel Intrusion Detection System for E-Commerce System," in International Conference on Management of e-Commerce and e-Government, Nanchang, China, 16-19 September 2009, p. 454.
    • [7] Z.Trabelsi and R.Mahdy, "An Anomaly Intrusion Detection System Employing Associative String Processor," in Ninth International Conference on Networks, Menuires, France, 11-16 April 2010, p. 220.
    • [8] C.C.Lo, C.C.Huang, and J.Ku, "A Cooperative Intrusion Detection System Framework for Cloud Computing Networks," in 39th International Conference on Parallel Processing Workshops, San Diego, USA, 13-16 September 2010, p. 281.
    • [9] J.Yang, X.Chen, X.Xiang, and J.Wan, "HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision Tree," in International Conference on Communications and Mobile Computing, Shenzhen, China, 12-14 April 2010, p. 70.
    • [10] J.Mallery et al., "Intrusion Detection and Response," in Hardening Network Security, Jane K. Brownlow, Ed. Emeriville: McGraw-HIll, 2005, pp. 365-386.
    • [11] E.Flior et al., "A Knowledge-Based System Implementation of Intrusion Detection Rules," in IEEE Seventh International Conference on Information Technology, Las Vegas, USA, 12-14 April 2010, pp. 738-739.
    • [12] S.Ohtahara, T.Kamiyama, and Y.Oyama, "Anomaly-based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines," in Ninth IEEE International Conference on Computer and Information Technology, Xiamen, China, 11-14 October 2009, pp. 217-219.
    • [13] D.L. Prowse, "Computer Security," in CompTIA Security+ SY0- 201 Cert Guide. Indianapolis, USA: Pearson Certification, 2011, ch. 2, p. 35.
    • [14] L.Gui-Xiang and G.Wei-Min, "Research on Network Security System Based on intrusion Detection," in International Conference on E-Business and E-Government, Guangzhou, China, 7-9 May 2010, p. 2096.
    • [15] F.Haddadi, S.Khanchi, M.Shetabi, and V.Derhami, "Intrusion Detection and Attack Classification Using Feed-Forward Neural Network," in Second International Conference on Computer and Network Technology, Bangkok, Thailand, 23-25 April 2010, p. 262.
    • [16] A.Jamdagni, Z.Tan, P.Nanda, X.He, and R.Liu, "Intrusion Detection Using Geometrical Structure," in Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China, 17-19 December 2009, p. 328.
    • [17] H.Yong and Z.X.Feng, "Expert System Based Intrusion Detection System," in Third International Conference on Information Management, Innovation Management and Industrial Engineering, Kunming, China, 26-28 November 2010, p. 404.
    • [18] S.Naiping and Z.Genyuan, "A study on Intrusion Detection Based on Data Mining," in International Conference of Information Science and Management Engineering, Xi'an, Shaanxi, China, 7-8 August 2010, p. 135.
    • [19] D.Zhao, Q.Xu, and Z.Feng, "Analysis and Design for Intrusion Detection System Based on Data Mining," in Second International Workshop on Education Technology and Computer Science, Wuhan, Hubei, China , 6-7 March 2010, p. 339.
    • [20] Y.Zhang, X.Ye, F.Xie, and Y.Peng, "A Practical Database Intrusion Detection System Framework," in IEEE Ninth International Conference on Computer and Information Technology, Xiamen, China, 11-14 October 2009, pp. 342-347.
    • [21] C.P. Pfleeger and S.L.Pfleeger, "Intrusion Detection Systems," in Security in Computing. Boston, USA: Pearson Education, 2007, pp. 484-490.
    • [22] J.Guo-song and Y.Zhi-Chao, "Intrusion Detection Models analysis and study of a new structure," in International Symposium on Intelligence Information Processing and Trusted Computing, Wuhan, Hubei China, 29-29 October 2010, pp. 676, 677.
    • [23] Z.Csajbók, "Simultaneous Anomaly and Misuse Intrusion Detections Based on Partial Approximative Set Theory," in 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing, Ayia Napa, Cyprus, 9-11 February, 2011, pp. 651-655.
    • [24] K.Hwang, M.Cai, Y.Chen, and M.Qin, "Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes," IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, pp. 41-55, January-March 2007.
    • [25] E.Chien and P.Ször. (2002) Blended Attacks Exploits,Vulnerabilities and Buffer-OverflowTechniques in Computer Viruses. [Online]. http://www.symantec.com/avcenter/reference/blended.attacks.pdf [Accessed 3 August 2011]
    • [26] J.Pincus and B.Baker, "Beyond Stack Smashing: Recent Advances in Exploiting Buffer Overruns," IEEE Security & Privacy, pp. 20-27, July 2004.
    • [27] C.H.Yau, Y.Y.Tan, A.S. Fong, and P.L.Mok, "Embedded Architectural Design Using Protection Logics to Defend Attack of Buffer Overflow and Unauthorized Access of Code," in IEEE 8th International Conference on Computer and Information Technology Workshops, 8-11 July 2008, p. 265.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article