2016 6th International Annual Engineering Seminar (InAES) 2016
DOI: 10.1109/inaes.2016.7821908
|View full text |Cite
|
Sign up to set email alerts
|

Designing Network Intrusion and Detection System using signature-based method for protecting OpenStack private cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(8 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…4. Signatures are a series of system calls made in certain orders, and duplicates are removed to identify specific executables [26]. This procedure is repeated for malware and benign traces, and subsequently, on receipt of all malware signatures, they are sorted by their frequency of appearances.…”
Section: Malware Detection Using Signature-based Approachmentioning
confidence: 99%
“…4. Signatures are a series of system calls made in certain orders, and duplicates are removed to identify specific executables [26]. This procedure is repeated for malware and benign traces, and subsequently, on receipt of all malware signatures, they are sorted by their frequency of appearances.…”
Section: Malware Detection Using Signature-based Approachmentioning
confidence: 99%
“…The working process on the rules, which can be written in any language, so that the rules can be read and modified easily [11]. The solution developed by signature-based IDS is used to find the sequences and patterns that match a particular attack signature, usually employed to scan the system files for any malicious activity [18]. A Hybrid IDS is a combined one that is derived from more than one kind of IDS.…”
Section: Signature Based Intrusion Detection Systemmentioning
confidence: 99%
“…Depending on the detection method, the NID systems can be largely categorized into signature-based and behavior-based NID systems [33]. The signature-based NID system [34] aims to detect malicious network activities by examining specific patterns in network traffic. Despite their popularity, this method tends to be insufficient for detecting unknown attacks for which patterns have not been analyzed.…”
Section: Related Workmentioning
confidence: 99%