2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA) 2015
DOI: 10.1109/aiccsa.2015.7507118
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral appraoch for intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…Among the 4 articles that reported the file format, 2 (50%) used comma separated values [43,52] and the other 2 (50%) used the SQL file format [55,58].…”
Section: File Formatmentioning
confidence: 99%
“…Among the 4 articles that reported the file format, 2 (50%) used comma separated values [43,52] and the other 2 (50%) used the SQL file format [55,58].…”
Section: File Formatmentioning
confidence: 99%
“…Regarding file format, Comma separated values (CSV) was commonly used as the file format [27,28]. Some studies also used SQL file format [29,41].…”
Section: Data Formatmentioning
confidence: 99%
“…We break them into two subcategories-those focusing on detection accuracy, and those focusing on IDS architecture. [160] Anomaly Simulation Clustering Unsupervised Wang & Zhu '17 [171] Anomaly KDD99 C5.0 DT Supervised…”
Section: System Logs Idssmentioning
confidence: 99%
“…Tchakoucht et al [160] improve upon the IDS of Yacine et al [14]. The goal is to help decrease User-to-Root (U2R) and Remote-to-Local (R2L) attacks that exploit operating system or software vulnerabilities.…”
Section: System Log Ids Researchmentioning
confidence: 99%