[go: up one dir, main page]

Zekrifa, 2014 - Google Patents

Hybrid Intrusion Detection System

Zekrifa, 2014

View PDF
Document ID
644618145276508943
Author
Zekrifa D
Publication year
Publication venue
Theses, School of Information Technology & Mathematical Sciences

External Links

Snippet

With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls

Similar Documents

Publication Publication Date Title
Sharafaldin et al. Towards a reliable intrusion detection benchmark dataset
Haddadi et al. Benchmarking the effect of flow exporters and protocol filters on botnet traffic classification
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Bhuyan et al. Towards Generating Real-life Datasets for Network Intrusion Detection.
García et al. Survey on network‐based botnet detection methods
Yegneswaran et al. An Architecture for Generating Semantic Aware Signatures.
Jeya et al. Efficient classifier for R2L and U2R attacks
Gogoi et al. Packet and flow based network intrusion dataset
Sperotto et al. A labeled data set for flow-based intrusion detection
Acarali et al. Survey of approaches and features for the identification of HTTP-based botnet traffic
Kumar et al. Intrusion detection systems: a review
Garcıa Identifying, modeling and detecting botnet behaviors in the network
BACHAR et al. Towards a behavioral network intrusion detection system based on the SVM model
Gandhi et al. Detecting and preventing attacks using network intrusion detection systems
Qin et al. Symmetry degree measurement and its applications to anomaly detection
Haddadi et al. Botnet behaviour analysis: How would a data analytics‐based system with minimum a priori information perform?
Uhříček et al. Bota: Explainable iot malware detection in large networks
Alavizadeh et al. A survey on threat situation awareness systems: framework, techniques, and insights
Zekrifa Hybrid Intrusion Detection System
Caulkins et al. A dynamic data mining technique for intrusion detection systems
Iorliam et al. " Flow Size Difference" Can Make a Difference: Detecting Malicious TCP Network Flows Based on Benford's Law
Raheja et al. Rule‐Based Approach for Botnet Behavior Analysis
Laabid Botnet command & control detection in iot networks
Prayote Knowledge based anomaly detection
Drašar Behavioral detection of distributed dictionary attacks