Journal ArticleDOI
Review: Intrusion detection system: A comprehensive review
TLDR
Through the extensive survey and sophisticated organization, this work proposes the taxonomy to outline modern IDSs and tries to give a more elaborate image for a comprehensive review.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2013-01-01. It has received 1102 citations till now. The article focuses on the topics: Intrusion detection system.read more
Citations
More filters
Proceedings ArticleDOI
Design Secure Cloud Based IoT Network for End to End Cloud Communication
TL;DR: In this article , a secure framework for cloud based IoT network using Machine Learning and Lightweight Cryptography is proposed. But the authors do not consider the security aspects for Detection of attacks, its Mitigation and Light Weight Cryptographic algorithm for End to End secure Cloud enabled IoT network communication.
Posted Content
A Wireless Intrusion Detection System for 802.11 WPA3 Networks.
TL;DR: In this paper, a signature-based IDS was proposed to detect all the attacks on WPA3 networks, including deauthentication, beacon flood, and beacon spoofing attacks.
Proceedings ArticleDOI
Investigation of Security Concerns and Solutions for the Internet of Things
TL;DR: In this article , the authors discuss the relationship between the major security threats, standards, implementations, and network safety in the Internet of Things (IoT), and examine how the IoT is being used to investigate each major threats.
Dissertation
Enhancing Cybersecurity with Encrypted Traffic Fingerprinting
Al Naami,Khaled Mohammed +1 more
Journal ArticleDOI
Applying Transfer Learning Approaches for Intrusion Detection in Software-Defined Networking
TL;DR: Huang et al. as discussed by the authors proposed a transfer learning method based on the SDN environment, which achieved an F1 score of 0.71 for unknown attacks and 0.51 for attack types identification.
References
More filters
Journal ArticleDOI
An Intrusion-Detection Model
TL;DR: A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Journal ArticleDOI
Efficient string matching: an aid to bibliographic search
TL;DR: A simple, efficient algorithm to locate all occurrences of any of a finite number of keywords in a string of text that has been used to improve the speed of a library bibliographic search program by a factor of 5 to 10.
Journal ArticleDOI
A fast string searching algorithm
TL;DR: The algorithm has the unusual property that, in most cases, not all of the first i .” in another string, are inspected.
Journal ArticleDOI
Anomaly-based network intrusion detection: Techniques, systems and challenges
TL;DR: The main challenges to be dealt with for the wide scale deployment of anomaly-based intrusion detectors, with special emphasis on assessment issues are outlined.
Proceedings Article
A Virtual Machine Introspection Based Architecture for Intrusion Detection.
Tal Garfinkel,Mendel Rosenblum +1 more
TL;DR: This paper presents an architecture that retains the visibility of a host-based IDS, but pulls the IDS outside of the host for greater attack resistance, achieved through the use of a virtual machine monitor.