Journal ArticleDOI
Review: Intrusion detection system: A comprehensive review
TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.read more
Citations
More filters
Book ChapterDOI
Dynamic Latency Sensitivity Recognition: An Application to Energy Saving
TL;DR: It is shown that energy savings through aggressive intrusion detection may be achieved without burdening latency sensitive traffic with delays that may render it unusable, nonetheless, as a side effect of early removal of unwanted traffic from the network flows is to reduce the network load.
Design, Implementation and Experiments for Moving Target Defense Framework
TL;DR: This dissertation proposes an attack-resilient framework that employs a novel defensive security strategy to reduce or eliminate the need to keep one step ahead of sophisticated attacks.
Journal ArticleDOI
Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks
Akshita Gupta,Sachin Kumar Gupta +1 more
TL;DR: This paper suggests the collaboration of UAV‐Fog architecture based on the four‐tier network consisting of smart things, local UAVs, UAVFog, and cloud server, to control UAV's data and also described some of the security issues faced by this cloud infrastructure.
Proceedings ArticleDOI
An abstraction layer for cybersecurity context
TL;DR: This paper outlines a flexible abstraction layer for access to security context to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices.
Journal ArticleDOI
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
TL;DR: In this paper , a MANIFold and Decision Boundary-based Adversarial Example Detection System (MANDA) is proposed to detect adversarial examples (AE) attacks.
References
More filters
Journal ArticleDOI
An Intrusion-Detection Model
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI
Efficient string matching: an aid to bibliographic search
TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI
A fast string searching algorithm
TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i .” in another string, are inspected.
Journal ArticleDOI
Anomaly-based network intrusion detection: Techniques, systems and challenges
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article
A Virtual Machine Introspection Based Architecture for Intrusion Detection.
Tal Garfinkel,Mendel Rosenblum +1 more
TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.