2010
DOI: 10.1504/ijsn.2010.032218
|View full text |Cite
|
Sign up to set email alerts
|

Experimental analysis of application-level intrusion detection algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…In this approach, the standard profile is made over a "session learning" method, which can be used to know an anomaly session. Warusia and Udzir (2014) [12] purpose novel "Signature Based Anomaly Detection Scheme" (SADS) which applied to learn packet headers performance patterns more accurately is proposed. Mixing data mining algorithms like Naive Bayes and Random Forest can be used to make low false alarms and reducing processing time.…”
Section: Literature Surveymentioning
confidence: 99%
“…In this approach, the standard profile is made over a "session learning" method, which can be used to know an anomaly session. Warusia and Udzir (2014) [12] purpose novel "Signature Based Anomaly Detection Scheme" (SADS) which applied to learn packet headers performance patterns more accurately is proposed. Mixing data mining algorithms like Naive Bayes and Random Forest can be used to make low false alarms and reducing processing time.…”
Section: Literature Surveymentioning
confidence: 99%
“…There are many related research studies in the following topics: various attacks and vulnerabilities , key management , traceback , elliptic curve cryptosystem intrusion detection , radio frequency identification security , security in wireless networks , trust , authentication , security in peer‐to‐peer networks , and other security issues .…”
Section: Introductionmentioning
confidence: 99%
“…Our other related work includes temporal accountability , accountability for wireless networks , logging , accountability in smart grids , and quantitative study of accountability . There are also many related work in network security .…”
Section: Introductionmentioning
confidence: 99%