Techno-Societal 2018 2019
DOI: 10.1007/978-3-030-16962-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection in Communication Networks Using Different Classifiers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…According to the authors of [9], "Intrusion Detection is the process of monitoring the events occurring in a computer system or network, and analyzing them for signs of intrusion", moreover, they define an intrusion as an attempt to bypass the security mechanisms of a network or a computer system, and then compromising the Confidentiality, Integrity, and Availability (CIA). Finally, the authors of [10,11] define an IDS as a piece of hardware or software program that monitors diverse malicious activities within computer systems and networks based on network packets, network flow, system logs, and rootkit analysis. The detailed roles and functionalities of a standard intrusion detection system are found in reference [12].…”
Section: Introductionmentioning
confidence: 99%
“…According to the authors of [9], "Intrusion Detection is the process of monitoring the events occurring in a computer system or network, and analyzing them for signs of intrusion", moreover, they define an intrusion as an attempt to bypass the security mechanisms of a network or a computer system, and then compromising the Confidentiality, Integrity, and Availability (CIA). Finally, the authors of [10,11] define an IDS as a piece of hardware or software program that monitors diverse malicious activities within computer systems and networks based on network packets, network flow, system logs, and rootkit analysis. The detailed roles and functionalities of a standard intrusion detection system are found in reference [12].…”
Section: Introductionmentioning
confidence: 99%
“…Intrusion Detection is the procedure of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusion”, similarly, an intrusion is an attempt to bypass the security mechanisms of a network or a computer system, thereby compromising the Confidentiality, Integrity, and Availability (CIA) ( Kagara & Md Siraj, 2020 ). Moreover, an IDS is any piece of hardware or software program that monitors diverse malicious activities within computer systems and networks based on network packets, network flow, system logs, and rootkit analysis ( Bhosale, Nenova & Iliev, 2020 ; Liu & Lang, 2019 ). Misused detection (knowledge or signature-based) and anomaly-based methods are the two main approaches to detecting intrusions within computer systems or networks.…”
Section: Introductionmentioning
confidence: 99%