2019 IEEE Symposium on Computers and Communications (ISCC) 2019
DOI: 10.1109/iscc47284.2019.8969772
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Immune Detection Approach Enhanced by Attack Graph Based Correlation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…The human immune system (HIS) has been an alternate DDoS attack detection field of research that is used to create an IDS system for IoT devices [ 12 ]. A novel AIS-based DDoS IDS system based on three immune concepts: adverse selection, danger theory, and clonal selection has been proposed [ 13 , 14 ]. DDoS attacks are detected by three fundamental network components: the source network, the intermediate network, and the endpoint.…”
Section: Introductionmentioning
confidence: 99%
“…The human immune system (HIS) has been an alternate DDoS attack detection field of research that is used to create an IDS system for IoT devices [ 12 ]. A novel AIS-based DDoS IDS system based on three immune concepts: adverse selection, danger theory, and clonal selection has been proposed [ 13 , 14 ]. DDoS attacks are detected by three fundamental network components: the source network, the intermediate network, and the endpoint.…”
Section: Introductionmentioning
confidence: 99%
“…Such advances in technological terms have been obtained and studied mainly from to allow adults to live with a better quality of life, have a long productive life and that the state expenses with health are reduced [2]. These are some researches that approached technological aspects from information sciences perspectives [3,4,5,6,7,8]. This increase in the use of digital forms for making payments and commercial receipts, as well as the wide range of possibilities for committing fraud in such procedures, make such activities demand greater attention from police authorities, to identify possible crimes and strange movements, especially money laundry [9].…”
Section: Introductionmentioning
confidence: 99%
“…Infected computers are known as bots or zombies and are controlled by botmaster [4,[6][7][8] that communicate to bot-client via a communication channel [3,9] to attack a computer target. Bot's malicious activities can be in the form of distributed denial of service (DDoS), spreading malware, phishing, sending spam messages, and misrepresentation of multi-layer adaptive clicks [1,[10][11][12][13]. Botnets use a command & control (C&C) structure in carrying out all their activities [3][4][5][6][7][8][9]14], including communication between bots and botmasters in sending commands and updating code from the botnet control system [4,8].…”
Section: Introductionmentioning
confidence: 99%