TENCON 2017 - 2017 IEEE Region 10 Conference 2017
DOI: 10.1109/tencon.2017.8228190
|View full text |Cite
|
Sign up to set email alerts
|

Host based intrusion detection system using frequency analysis of n-gram terms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(13 citation statements)
references
References 11 publications
1
12
0
Order By: Relevance
“…If the similarity measure is below a predefined threshold, it is considered an anomaly. Similar works can be seen in [31]- [33].…”
Section: Related Worksupporting
confidence: 82%
“…If the similarity measure is below a predefined threshold, it is considered an anomaly. Similar works can be seen in [31]- [33].…”
Section: Related Worksupporting
confidence: 82%
“…Subba et al [37] proposed a novel HIDS framework to reduce computation and be resource intensive. The proposed framework firstly turns the system call traces into n-gram vectors and then reduces the size of the input feature vectors by applying a dimensionality reduction.…”
Section: ) Related Workmentioning
confidence: 99%
“…For example, N size can be 1, denoting unigram; 2, denoting a bigram; 3, denoting a tri-gram [17,129]. In terms of exploiting N-gram location for intrusion detection, there exist many IDSs that use the N-gram technique to analyze network packets payload; two examples are specified in [130][131][132]. The N-grams are used to model the language that characterizes a network traffic profile, since each different N-gram is interpreted as a different feature space used to represent the traffic.…”
Section: Feature Extractionmentioning
confidence: 99%