2017 International Conference on Inventive Computing and Informatics (ICICI) 2017
DOI: 10.1109/icici.2017.8365277
|View full text |Cite
|
Sign up to set email alerts
|

A survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and protection system (IIDPS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(33 citation statements)
references
References 6 publications
0
33
0
Order By: Relevance
“…An attacker could falsify its IP address so that the IDS becomes unable to stop the intrusions to the network from taking place [22] which may reduce the attack detection efficiency. In [23], the authors presented the IDS as a combination of devices and software applications capable of detecting malicious activities and generating the corresponding report. In many cases, false positives reports are more frequent than actual threats [23].…”
Section: B Network Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…An attacker could falsify its IP address so that the IDS becomes unable to stop the intrusions to the network from taking place [22] which may reduce the attack detection efficiency. In [23], the authors presented the IDS as a combination of devices and software applications capable of detecting malicious activities and generating the corresponding report. In many cases, false positives reports are more frequent than actual threats [23].…”
Section: B Network Intrusion Detection Systemsmentioning
confidence: 99%
“…In [23], the authors presented the IDS as a combination of devices and software applications capable of detecting malicious activities and generating the corresponding report. In many cases, false positives reports are more frequent than actual threats [23]. So, the real attacks can slip through false reports or be ignored.…”
Section: B Network Intrusion Detection Systemsmentioning
confidence: 99%
“…1) Intrusion detection system (IDS): It monitors both external facing and internal systems to detect malicious activities [12]. It scans live traffics, contents on different systems, and system logs, and perform various data mining organization through Internet.…”
Section: Detection Defense Mechanismsmentioning
confidence: 99%
“…The formula for the distance calculation is defined in the Equation (1) as: Fig.4. General Structure of Neural Networks (1) Using this formula, the steps for finding the clusters using the K-Means algorithm can be defined as:…”
Section: G K-means Algorithmmentioning
confidence: 99%