[go: up one dir, main page]

Wanda et al., 2019 - Google Patents

A survey of intrusion detection system

Wanda et al., 2019

View PDF
Document ID
1248461548020559775
Author
Wanda P
Jie H
Publication year
Publication venue
International Journal of Informatics and Computation

External Links

Snippet

Nowadays, the evolution of the internet and the use of computer systems has resulted in the huge electronic transformation of data that experienced multiple problems such as security, privacy, and confidentiality of information. Significant progress has been made in terms of …
Continue reading at ijicom.respati.ac.id (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities

Similar Documents

Publication Publication Date Title
Wanda et al. A survey of intrusion detection system
Ur Rehman et al. DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Anthi et al. A supervised intrusion detection system for smart home IoT devices
Singh et al. Botnet‐based IoT network traffic analysis using deep learning
Alieyan et al. A survey of botnet detection based on DNS
Om Kumar et al. Detecting and confronting flash attacks from IoT botnets: CU Om Kumar, PRK Sathia Bhama
Othman et al. Survey on intrusion detection system types
Kaur Chahal et al. Distributed denial of service attacks: a threat or challenge
Modi et al. A survey of intrusion detection techniques in cloud
Vashishtha et al. HIDM: A hybrid intrusion detection model for cloud based systems
Bijone A survey on secure network: intrusion detection & prevention approaches
Chiba et al. A survey of intrusion detection systems for cloud computing environment
Kumar et al. INTRUSION DETECTION SYSTEMS: A REVIEW.
Baykara et al. A survey on potential applications of honeypot technology in intrusion detection systems
Veluchamy et al. Deep reinforcement learning for building honeypots against runtime DoS attack
Modi et al. A feasible approach to intrusion detection in virtual network layer of Cloud computing
Rene et al. Malicious code intrusion detection using machine learning and indicators of compromise
Krishnan et al. An adaptive distributed intrusion detection system for cloud computing framework
Vij et al. Intrusion detection systems: Conceptual study and review
Marques et al. A flow-based multi-agent data exfiltration detection architecture for ultra-low latency networks
Umamaheswari et al. Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model
Kumari et al. SmRM: Ensemble Learning Devised Solution for Smart Riskware Management in Android Machines
Essa et al. Evaluation of tree-based machine learning algorithms for network intrusion detection in the internet of things
Ramesh et al. Analyzing and detecting botnet attacks using anomaly detection with machine learning
Schmitt et al. Intelligent threat hunting in software-defined networking