2010 International Conference on Intelligent Systems, Modelling and Simulation 2010
DOI: 10.1109/isms.2010.72
|View full text |Cite
|
Sign up to set email alerts
|

Automated Technique for Debugging Network Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(22 citation statements)
references
References 14 publications
0
22
0
Order By: Relevance
“…Cucurull et al [13] summarized the comparison of multiple intrusion detection techniques on SWITCH/AS559 dataset. Nehinbe et al [14] proposed Expert-track model to automatically adjust the rule space. Caberera et al [15] constructed a detection method based on Poisson distribution to detect DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Cucurull et al [13] summarized the comparison of multiple intrusion detection techniques on SWITCH/AS559 dataset. Nehinbe et al [14] proposed Expert-track model to automatically adjust the rule space. Caberera et al [15] constructed a detection method based on Poisson distribution to detect DoS attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The complexity and reoccurrence of threats and cyber attacks on the entire components of Cyber Physical Systems (CPSs) have made many organizations to develop the habit of deploying several categories of Intrusion Detection Systems (IDSs) within the peripherals and gateways of their connections to the entire Cyber Physical systems (CPSs) so that these devices can collect and analyze activities that signify evidence of intrusions against their corporate networks in real-time [8,9]. Subsequently, analysts can quickly review the reports and respond to the attacks before the attacks achieve the objectives of intruders that launch them [10].…”
Section: Introductionmentioning
confidence: 99%
“…In other words, Figure 1 demonstrates one of the two approaches organizations can adopt to position Network Intrusion Detection System (NIDS) in relation to firewall within the peripherals and gateways that connect them to the entire Cyber Physical Systems (CPSs) [7,8]. Nevertheless, numerous studies often attest that Intrusion Detection Systems (IDSs) must always be upgraded to strongly help operators control the new dimensions and rising waves of intrusions against cyber physical resources across the globe.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations