Wanda et al., 2019 - Google Patents
A survey of intrusion detection systemWanda et al., 2019
View PDF- Document ID
- 1248461548020559775
- Author
- Wanda P
- Jie H
- Publication year
- Publication venue
- International Journal of Informatics and Computation
External Links
Snippet
Nowadays, the evolution of the internet and the use of computer systems has resulted in the huge electronic transformation of data that experienced multiple problems such as security, privacy, and confidentiality of information. Significant progress has been made in terms of …
- 238000001514 detection method 0 title abstract description 132
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0492—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wanda et al. | A survey of intrusion detection system | |
| Ur Rehman et al. | DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) | |
| Anthi et al. | A supervised intrusion detection system for smart home IoT devices | |
| Singh et al. | Botnet‐based IoT network traffic analysis using deep learning | |
| Alieyan et al. | A survey of botnet detection based on DNS | |
| Om Kumar et al. | Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama | |
| Othman et al. | Survey on intrusion detection system types | |
| Kaur Chahal et al. | Distributed denial of service attacks: a threat or challenge | |
| Modi et al. | A survey of intrusion detection techniques in cloud | |
| Vashishtha et al. | HIDM: A hybrid intrusion detection model for cloud based systems | |
| Bijone | A survey on secure network: intrusion detection & prevention approaches | |
| Chiba et al. | A survey of intrusion detection systems for cloud computing environment | |
| Kumar et al. | INTRUSION DETECTION SYSTEMS: A REVIEW. | |
| Baykara et al. | A survey on potential applications of honeypot technology in intrusion detection systems | |
| Veluchamy et al. | Deep reinforcement learning for building honeypots against runtime DoS attack | |
| Modi et al. | A feasible approach to intrusion detection in virtual network layer of Cloud computing | |
| Rene et al. | Malicious code intrusion detection using machine learning and indicators of compromise | |
| Krishnan et al. | An adaptive distributed intrusion detection system for cloud computing framework | |
| Vij et al. | Intrusion detection systems: Conceptual study and review | |
| Marques et al. | A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks | |
| Umamaheswari et al. | Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model | |
| Kumari et al. | SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines | |
| Essa et al. | Evaluation of tree-based machine learning algorithms for network intrusion detection in the internet of things | |
| Ramesh et al. | Analyzing and detecting botnet attacks using anomaly detection with machine learning | |
| Schmitt et al. | Intelligent threat hunting in software-defined networking |