2007 IEEE International Symposium on Consumer Electronics 2007
DOI: 10.1109/isce.2007.4382163
|View full text |Cite
|
Sign up to set email alerts
|

Application of Wavelets and Self-similarity to Enterprise Network Intrusion Detection and Prevention Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…Many studies have shown that changes in Hurst parameters can be used for intrusion detection. According to Akujuobi et al [12], changing the Hurst parameter reduces high false positive and negative rates by setting the minimum change in the Hurst parameter as an intrusion indicator. Schleifer and Männle [13] proposed an approach to achieving high sensitivity by using the self-immunity properties in network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Many studies have shown that changes in Hurst parameters can be used for intrusion detection. According to Akujuobi et al [12], changing the Hurst parameter reduces high false positive and negative rates by setting the minimum change in the Hurst parameter as an intrusion indicator. Schleifer and Männle [13] proposed an approach to achieving high sensitivity by using the self-immunity properties in network traffic.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Combination of expert system and statistical approach was very popular [22]. We identified from past research on using technique method with wavelet by [1] and [31], they present the technique a Hidden Markov Model (HMM) to model sensor, in 2009, Friaz-Martinez [9] proposed with incrementallearning algorithm, Yaron in 2006 [32], present Pattern-matching algorithm. Additionally proposal [33], they experiment data with artificial immune algorithm, and proposal Myint in 2009 [34] uses incremental learning based solutions.…”
Section: )mentioning
confidence: 99%
“…This situation has resulted in huge financial losses to various enterprises over the past few years, thereby stepping up research work in the area of network security as demonstrated in Akujuobi and Ampah (2007), Akujuobi et al (2007aAkujuobi et al ( , 2007bAkujuobi et al ( , 2007c, Ampah et al (2011), Hixon and Gruenbacher (2004), Kayacik et al (2004) and Janakiraman et al (2003).…”
Section: Introductionmentioning
confidence: 99%