Keyword : intrusion detection


A Sequential Classifiers Combination Method to Reduce False Negative for Intrusion Detection System
Sornxayya PHETLASY Satoshi OHZAHATA Celimuge WU Toshihito KATO 
Publication:   
Publication Date: 2019/05/01
Vol. E102-D  No. 5 ; pp. 888-897
Type of Manuscript:  Special Section PAPER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
sequential classifiers combinationfalse negativeintrusion detectionmachine learning
 Summary | Full Text:PDF(1.9MB)

Regular Expression Filtering on Multiple q-Grams
Seon-Ho SHIN HyunBong KIM MyungKeun YOON 
Publication:   
Publication Date: 2018/01/01
Vol. E101-D  No. 1 ; pp. 253-256
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
regular expressionstring matchingq-gramintrusion detectiondeep packet inspection
 Summary | Full Text:PDF(282KB)

Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems
Min SHAO Min S. KIM Victor C. VALGENTI Jungkeun PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8 ; pp. 2090-2099
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
workload generationintrusion detection
 Summary | Full Text:PDF(1.1MB)

Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System
Aslhan AKYOL Mehmet HACIBEYOĞLU Bekir KARLIK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/07/01
Vol. E99-D  No. 7 ; pp. 1810-1821
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
intrusion detectiondiscernibility functionfeature selectionneural networks
 Summary | Full Text:PDF(2.6MB)

Fuzzy-Based Adaptive Countering Method against False Data Injection Attacks in Wireless Sensor Networks
Hae Young LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 964-967
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
wireless sensor networksnetwork securityintrusion detectionfalse data injection attackfuzzy logic
 Summary | Full Text:PDF(628.2KB)

Client Honeypot Multiplication with High Performance and Precise Detection
Mitsuaki AKIYAMA Takeshi YAGI Youki KADOBAYASHI Takeo HARIU Suguru YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 775-787
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: Attack Monitoring & Detection
Keyword: 
client honeypotdrive-by downloadweb-based malwareprocess sandboxintrusion detection
 Summary | Full Text:PDF(892.7KB)

Data Mining Intrusion Detection in Vehicular Ad Hoc Network
Xiaoyun LIU Gongjun YAN Danda B. RAWAT Shugang DENG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/07/01
Vol. E97-D  No. 7 ; pp. 1719-1726
Type of Manuscript:  Special Section PAPER (Special Section on Cloud and Services Computing)
Category: 
Keyword: 
vehicular networksmobile networksintrusion detectionvehicular ad hoc networksecurity
 Summary | Full Text:PDF(1.8MB)

Detecting Stealthy Spreaders by Random Aging Streaming Filters
MyungKeun YOON Shigang CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8 ; pp. 2274-2281
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
network securityintrusion detectionspreader detectionport scananomaly detection
 Summary | Full Text:PDF(548.6KB)

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
Jingyu HUA Mingchu LI Yizhi REN Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 255-264
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Network Security
Keyword: 
intrusion detectionstate transition tablestatic analysisstack walks
 Summary | Full Text:PDF(2MB)

Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki AKIYAMA Makoto IWAMURA Yuhei KAWAKOYA Kazufumi AOKI Mitsutaka ITOH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1131-1139
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
malwareclient honeypotintrusion detection
 Summary | Full Text:PDF(2.3MB)

Group Testing Based Detection of Web Service DDoS Attackers
Dalia NASHAT Xiaohong JIANG Michitaka KAMEYAMA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/05/01
Vol. E93-B  No. 5 ; pp. 1113-1121
Type of Manuscript:  Special Section PAPER (Special Section on Technology and Architecture for Sustainable Growth of the Internet)
Category: 
Keyword: 
distributed denial of servicegroup-testingintrusion detectionchange point detection
 Summary | Full Text:PDF(4.4MB)

A Cyber-Attack Detection Model Based on Multivariate Analyses
Yuto SAKAI Koichiro RINSAKA Tadashi DOHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7 ; pp. 1585-1592
Type of Manuscript:  Special Section PAPER (Special Section on Recent Advances in Technologies for Assessing System Reliability)
Category: 
Keyword: 
information securitycyber-attackintrusion detectionquantification methodcluster analysis
 Summary | Full Text:PDF(345.1KB)

Constructing a Multilayered Boundary to Defend against Intrusive Anomalies
Zonghua ZHANG Hong SHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/02/01
Vol. E90-D  No. 2 ; pp. 490-499
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectioninformation securityPOMDP
 Summary | Full Text:PDF(403.8KB)

A Novel Intelligent Intrusion Detection, Decision, Response System
Hongmei KAI Hongbing ZHU Kei EGUCHI Ningping SUN Toru TABATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/06/01
Vol. E89-A  No. 6 ; pp. 1630-1637
Type of Manuscript:  Special Section PAPER (Special Section on Papers Selected from 2005 International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC2005))
Category: 
Keyword: 
intrusion detectionintrusion decisionintrusion responsefuzzy theoryfailed loginmisuse user
 Summary | Full Text:PDF(692.3KB)

Security Protocols Protection Based on Anomaly Detection
Abdulrahman ALHARBY Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1 ; pp. 189-200
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet III)
Category: Intrusion Detection
Keyword: 
intrusion detectionsecurity protocolsanomaly detectiondynamic Bayesian network
 Summary | Full Text:PDF(2.1MB)

An Efficient Method for Optimal Probe Deployment of Distributed IDS
Jing WANG Naoya NITTA Hiroyuki SEKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/08/01
Vol. E88-D  No. 8 ; pp. 1948-1957
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
network securityintrusion detectionnetwork IDSdistributed IDSIDS partition deployment problem
 Summary | Full Text:PDF(1.1MB)

Efficient Masquerade Detection Using SVM Based on Common Command Frequency in Sliding Windows
Han-Sung KIM Sung-Deok CHA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/11/01
Vol. E87-D  No. 11 ; pp. 2446-2452
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionmasquerade detectionanomaly detectionmachine learningSVM (Support Vector Machine)user command
 Summary | Full Text:PDF(646.6KB)

A Clustering-Based Anomaly Intrusion Detector for a Host Computer
Sang Hyun OH Won Suk LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2086-2094
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectiondata miningclusteringuser profiling
 Summary | Full Text:PDF(466.5KB)

The Correlation Deduction Method for Intrusion Decision Based on Heterogeneous Sensors
Minsoo KIM Bong-Nam NOH 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/10/01
Vol. E86-D  No. 10 ; pp. 2209-2217
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
intrusion detectionthresholdsensor correlation
 Summary | Full Text:PDF(1.3MB)

An Improved TCP Protocol Machine for Flow Analysis and Network Monitoring
Heshmatollah KHOSRAVI Masaki FUKUSHIMA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/02/01
Vol. E86-B  No. 2 ; pp. 595-603
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology III)
Category: Traffic Monitoring and Evaluation
Keyword: 
finite state machine (FSM)TCP protocol machineinvalid flownetwork congestionintrusion detection
 Summary | Full Text:PDF(430.2KB)

Public Information Server for Tracing Intruders in the Internet
Midori ASAKA Takefumi ONABUTA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/12/01
Vol. E84-B  No. 12 ; pp. 3104-3112
Type of Manuscript:  Special Section PAPER (Special Issue on Network Software)
Category: Internet Technologies
Keyword: 
intrusion detectionnetwork securitytracing intrudersstepping stones
 Summary | Full Text:PDF(641.6KB)

A New Intrusion Detection Method Based on Discriminant Analysis
Midori ASAKA Takefumi ONABUTA Tadashi INOUE Shunji OKAZAWA Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/05/01
Vol. E84-D  No. 5 ; pp. 570-577
Type of Manuscript:  Special Section PAPER (Special Issue on High-speed Internet Technology and its Applications)
Category: 
Keyword: 
intrusion detectiondiscriminant analysismultivariate analysisnetwork securitysystem call
 Summary | Full Text:PDF(451.4KB)

Detecting Malicious Activities through Port Profiling
Makoto IGUCHI Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/04/25
Vol. E82-D  No. 4 ; pp. 784-792
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology and Its Applications)
Category: 
Keyword: 
intrusion detectionauditingprofilingnetwork surveillance
 Summary | Full Text:PDF(250.9KB)