Shah et al., 2015 - Google Patents
Disclosing malicious traffic for Network SecurityShah et al., 2015
- Document ID
- 4320829635695166734
- Author
- Shah K
- Kapdi T
- Publication year
- Publication venue
- International Journal of Advances in Engineering & Technology
External Links
Snippet
Network anomaly detection is a broad area of research. The use of entropy and distributions of traffic features has received a lot of attention in the research community. While previous work has demonstrated the benefits of using the entropy of different traffic distributions in …
- 238000001514 detection method 0 abstract description 21
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rubio et al. | Current cyber-defense trends in industrial control systems | |
| Navaz et al. | Entropy based anomaly detection system to prevent DDoS attacks in cloud | |
| Patel et al. | An intrusion detection and prevention system in cloud computing: A systematic review | |
| Niksefat et al. | Privacy issues in intrusion detection systems: A taxonomy, survey and future directions | |
| Chung et al. | NICE: Network intrusion detection and countermeasure selection in virtual network systems | |
| US20060026682A1 (en) | System and method of characterizing and managing electronic traffic | |
| KR100947211B1 (en) | Active Security Audit System | |
| Krishnan et al. | An adaptive distributed intrusion detection system for cloud computing framework | |
| Varma et al. | A review of DDoS attacks and its countermeasures in cloud computing | |
| Agrawal et al. | A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS. | |
| Shah et al. | Disclosing malicious traffic for Network Security | |
| STIAWAN1&2 et al. | Intrusion prevention system: a survey | |
| Ramprasath et al. | Virtual Guard Against DDoS Attack for IoT Network Using Supervised Learning Method | |
| Selvaraj et al. | security vulnerabilities, threats, and attacks in IoT and big data: Challenges and solutions | |
| Seifi et al. | A study on the efficiency of intrusion detection systems in IoT networks | |
| Singh | Intrusion detection system (IDS) and intrusion prevention system (IPS) for network security: a critical analysis | |
| Mallissery et al. | Survey on intrusion detection methods | |
| Sivakumar et al. | Preventing Network From Intrusive Attack Using Artificial Neural Networks | |
| Khanday et al. | Intrusion detection systems for trending cyberattacks | |
| Pareta et al. | An integrated approach for effective intrusion detection with elasticsearch | |
| Gomathi et al. | Identification of Network Intrusion in Network Security by Enabling Antidote Selection | |
| Jain et al. | The role of decision tree technique for automating intrusion detection system | |
| Hooper | Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy | |
| Wang | ‘Big Data in Network Security Systems | |
| Shephard | Information security-who cares? |