Movatterモバイル変換


[0]ホーム

URL:


Kumar et al., 2017 - Google Patents

Intrusion detection systems: a review

Kumar et al., 2017

ViewPDF
Document ID
5969593257889788216
Author
Kumar D
Venugopalan S
Publication year
Publication venue
International Journal of Advanced Research in Computer Science

External Links

Snippet

Given the exponential growth of Internet and increased availability of bandwidth, Intrusion Detection has become the critical component of Information Security and the importance of secure networks has tremendously increased. Though the concept of Intrusion Detection …
Continue reading atwww.academia.edu (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • G08G1/0133Traffic data processing for classifying traffic situation
    • GPHYSICS
    • G08SIGNALLING
    • G08GTRAFFIC CONTROL SYSTEMS
    • G08G1/00Traffic control systems for road vehicles
    • G08G1/01Detecting movement of traffic to be counted or controlled
    • G08G1/0104Measuring and analyzing of parameters relative to traffic conditions
    • G08G1/0125Traffic data processing
    • G08G1/0129Traffic data processing for creating historical data or processing based on historical data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet

Similar Documents

PublicationPublication DateTitle
Khraisat et al.A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
Wani et al.SDN‐based intrusion detection system for IoT using deep learning classifier (IDSIoT‐SDL)
Alshamrani et al.A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
Kumar et al.Intrusion detection systems: a review
Hajj et al.Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
BijoneA survey on secure network: intrusion detection & prevention approaches
Bagui et al.Using machine learning techniques to identify rare cyber‐attacks on the UNSW‐NB15 dataset
MoustafaDesigning an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic
ThomasImproving intrusion detection for imbalanced network traffic
Chen et al.Intrusion detection
Krishnapriya et al.A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques.
MöllerIntrusion detection and prevention
Suhag et al.Study of statistical techniques and artificial intelligence methods in distributed denial of service (DDOS) assault and defense
SfetcuAdvanced persistent threats in cybersecurity–Cyber warfare
Chaitanya et al.Security and Privacy in Wireless Sensor Networks Using Intrusion Detection Models to Detect DDOS and Drdos Attacks: A Survey
AlauthmanAn efficient approach to online bot detection based on a reinforcement learning technique
Borisenko et al.How the CSE-CIC-IDS2018 Dataset is Related to the MITRE Matrix
Hagar et al.Big data analytic using machine learning algorithms for intrusion detection system: A survey
Ali et al.Behavior analysis of machine learning algorithms for botnets detection
BaazeemCybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques
MöllerIntrusion detection and prevention
Chablani et al.Analysis of Cyber Defense mechanisms using honeypots in Cloud Environment
Giri et al.Intrusion detection system for local networks–A review study
PetersenDetecting network intrusions
MahfouzTowards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets

[8]
ページ先頭

©2009-2025 Movatter.jp