2008
DOI: 10.1016/j.eswa.2007.03.011
|View full text |Cite
|
Sign up to set email alerts
|

Detecting attack signatures in the real network traffic with ANNIDA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0
2

Year Published

2011
2011
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 7 publications
0
7
0
2
Order By: Relevance
“…Most of the mechanisms proposed so far for detection of flood attacks are signature‐based, therefore they are unable to detect the unknown attacks and results with high‐false acceptance rate . These limitations motivated the research community to propose anomaly based intelligent detection mechanisms that result in low‐false rates .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of the mechanisms proposed so far for detection of flood attacks are signature‐based, therefore they are unable to detect the unknown attacks and results with high‐false acceptance rate . These limitations motivated the research community to propose anomaly based intelligent detection mechanisms that result in low‐false rates .…”
Section: Related Workmentioning
confidence: 99%
“…If a new type of flooding attack is determined, a new classifier is allocated to the new attack traffic and added into the trained ensemble without retraining of the whole ensemble. Most of the mechanisms proposed so far for detection of flood attacks are signature-based, therefore they are unable to detect the unknown attacks and results with highfalse acceptance rate [26,27]. These limitations motivated the research community to propose anomaly based intelligent detection mechanisms that result in low-false rates [28,29].…”
Section: Related Workmentioning
confidence: 99%
“…By undergoing this kind of attempts, catastrophic failures of susceptible systems can be reduced. Detection stability and detection precision are two key indicators used to evaluate IDS (Intrusion Detection System) [26]. Many of the IDS research studies have been done in order to improve the detection stability and detection precision [22].…”
Section: Introductionmentioning
confidence: 99%
“…Especificamente para redes de computadores, têm-se os Sistemas de Detecção de Intrusão de Rede (SDIR) [31], que utilizam informações coletadas em uma rede ou segmento de rede para identificar ataques que estejam ocorrendo ou que já tenham ocorrido. Para a análise dos dados coletados da rede, os SDIR usam principalmente [20] a abordagem baseada em assinaturas [39] e a abordagem baseada em anomalias [21], ambas apresentando suas peculiaridades e limitações. A abordagem baseada em assinaturas [20] requer um conhecimento prévio a respeito da forma como cada ataque a uma rede ocorre, ou seja, sua assinatura.…”
Section: Introductionunclassified