2011
DOI: 10.1186/1687-417x-2011-2
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection model based on selective packet sampling

Abstract: Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2(3):399, 2008; IEEE Netw 23(1):6, 2009) has shown that it is possible to maintain a high level of network security while selectively inspecting packets for the existence of intrusive activity, thereby resulting in a minimal amount of processing overhead. In this paper, a statistical approach for the modeling of network intrusions as Markov processes is introduced. The theoretical findings presented here confirm the earlier experimental re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 20 publications
(30 reference statements)
0
3
0
Order By: Relevance
“…Authors in [5] propose to single out large flows for IDS and sample fewer packets for increased computational efficiency. In [6] an approach based on Markov chains to sample packets for IDS was used. [7] lay out a gametheoretic model for determining which network paths are more vulnerable and require more packet sampling and [8] develop a system for Software Defined Networks, which aims to sample more packets from more vulnerable parts of the network.…”
Section: Related Workmentioning
confidence: 99%
“…Authors in [5] propose to single out large flows for IDS and sample fewer packets for increased computational efficiency. In [6] an approach based on Markov chains to sample packets for IDS was used. [7] lay out a gametheoretic model for determining which network paths are more vulnerable and require more packet sampling and [8] develop a system for Software Defined Networks, which aims to sample more packets from more vulnerable parts of the network.…”
Section: Related Workmentioning
confidence: 99%
“…Yet, rewalls can, up to some extent, lter the incoming packets based on security policy but are not perfect in stopping modern internet attacks such as Botnet attacks. Therefore, an Intrusion Detection System (IDS) [4,17] is used to provide security to the network. This IDS monitors the packets owing in the network and analyses them to nd attacks from the internet trying to compromise the system security.…”
Section: Introductionmentioning
confidence: 99%
“…Since confidentiality is often a minor priority in such networks, encryption can be neglected. A model using an intrusion detection system (IDS) based on selective packet sampling has been proposed in [3]. However, IDS in the embedded environment are associated with some drawbacks.…”
Section: Introductionmentioning
confidence: 99%