2008 8th IEEE International Conference on Computer and Information Technology 2008
DOI: 10.1109/cit.2008.4594714
|View full text |Cite
|
Sign up to set email alerts
|

An overview of recent advances in intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…An multi-agent approach (Marhusin et al, 2008;Sulaiman et al, 2011) offers a more dynamic socialoriented based communications.…”
Section: Multi-agent Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…An multi-agent approach (Marhusin et al, 2008;Sulaiman et al, 2011) offers a more dynamic socialoriented based communications.…”
Section: Multi-agent Systemsmentioning
confidence: 99%
“…Auto update sometime requires software or system reboots that might prohibit user from choosing this option. Alternatively, we require a mechanism such as a detection model which is described in (Marhusin, 2012) to detect any attempts to exploit vulnerable software or system as any code will require execution and/or transmission.…”
Section: Vulnerability Exploitationmentioning
confidence: 99%
“…Misuse detection technique uses specifically known patterns of unauthorized behavior to predict and detect subsequent similar attempts. These specific patterns are called signatures [8,9].…”
Section: Select * From Users Where User_name='' or 1=1mentioning
confidence: 99%
“…Intrusion detection research has employed analysis based on various sources such as audit trails, network traffic and kernel API calls [2]. In malware detection research, a number of solutions has been attempted including checksum, heuristic, integrity shell, string checker, system call tracing, machine emulators, logic analyzers, network sniffers, software certification etc [3], [4].…”
Section: Problem Statementmentioning
confidence: 99%