2020 12th International Conference on Information Technology and Electrical Engineering (ICITEE) 2020
DOI: 10.1109/icitee49829.2020.9271727
|View full text |Cite
|
Sign up to set email alerts
|

Comparison of Hybrid Intrusion Detection System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…It can base its operation on different modalities, the most common of them are: (i) anomaly-based, according to which it classifies the network activities based on a rules/heuristic-based strategy, then by analyzing their behavior instead querying a database of known patterns [25]; (ii) signature-based, where the new network activity pattern is compared to the known patterns stored in a database, and it is classified based on the basis of this comparison process [26]; (iii) specification-based, according to which the system inspects the involved protocols to detect anomalous sequences that may refer to an attack in progress [27]; (iv) hybrid-based, which does not represent a pure modality but a combination of the previous ones [28].…”
Section: Background and Related Workmentioning
confidence: 99%
“…It can base its operation on different modalities, the most common of them are: (i) anomaly-based, according to which it classifies the network activities based on a rules/heuristic-based strategy, then by analyzing their behavior instead querying a database of known patterns [25]; (ii) signature-based, where the new network activity pattern is compared to the known patterns stored in a database, and it is classified based on the basis of this comparison process [26]; (iii) specification-based, according to which the system inspects the involved protocols to detect anomalous sequences that may refer to an attack in progress [27]; (iv) hybrid-based, which does not represent a pure modality but a combination of the previous ones [28].…”
Section: Background and Related Workmentioning
confidence: 99%
“…In contrast, anomaly-based systems strive to establish a baseline of normal behavior and flag any activity that strays from this standard. Given the dynamic nature of cybersecurity threats, adaptive security measures that combine these methodologies are the preferred choice [3], [38].…”
Section: Network Intrusion Detectionmentioning
confidence: 99%
“…In Network-based IDS, the outside intrusion is very well detected, and it can protect all hosts, but there is too much traffic to analyze [63]. Hybrid IDS is flexible and provides more security as it combines features of both Host-based and Network-based IDS [64]. In Active IDS, definite action is taken for certain alerts, whereas only reports are generated, or alarms are raised in Passive IDS.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%