scispace - formally typeset
Journal ArticleDOI

Review: Intrusion detection system: A comprehensive review

TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.

read more

Citations
More filters
Book ChapterDOI

Dynamic Latency Sensitivity Recognition: An Application to Energy Saving

TL;DR: It is shown that energy savings through aggressive intrusion detection may be achieved without burdening latency sensitive traffic with delays that may render it unusable, nonetheless, as a side effect of early removal of unwanted traffic from the network flows is to reduce the network load.

Design, Implementation and Experiments for Moving Target Defense Framework

Norman Ahmed
TL;DR: This dissertation proposes an attack-resilient framework that employs a novel defensive security strategy to reduce or eliminate the need to keep one step ahead of sophisticated attacks.
Journal ArticleDOI

Flying through the secure fog: A complete study on UAV‐Fog in heterogeneous networks

TL;DR: This paper suggests the collaboration of UAV‐Fog architecture based on the four‐tier network consisting of smart things, local UAVs, UAV­Fog, and cloud server, to control UAV's data and also described some of the security issues faced by this cloud infrastructure.
Proceedings ArticleDOI

An abstraction layer for cybersecurity context

TL;DR: This paper outlines a flexible abstraction layer for access to security context to program and gather data from lightweight inspection and enforcement hooks deployed in cloud applications and IoT devices.
Journal ArticleDOI

MANDA: On Adversarial Example Detection for Network Intrusion Detection System

TL;DR: In this paper , a MANIFold and Decision Boundary-based Adversarial Example Detection System (MANDA) is proposed to detect adversarial examples (AE) attacks.
References
More filters
Journal ArticleDOI

An Intrusion-Detection Model

TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI

Efficient string matching: an aid to bibliographic search

TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI

A fast string searching algorithm

TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i.” in another string, are inspected.
Journal ArticleDOI

Anomaly-based network intrusion detection: Techniques, systems and challenges

TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article

A Virtual Machine Introspection Based Architecture for Intrusion Detection.

TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.
Related Papers (5)