2013
DOI: 10.1016/j.asoc.2012.09.017
|View full text |Cite
|
Sign up to set email alerts
|

Minimal complexity attack classification intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…Since research is going on to detect new attacks with the key component as data mining [16]. Data mining is the investigation of data to create relation and detect concealed pattern of data or to prevent the data from unnoticed.…”
Section: Related Workmentioning
confidence: 99%
“…Since research is going on to detect new attacks with the key component as data mining [16]. Data mining is the investigation of data to create relation and detect concealed pattern of data or to prevent the data from unnoticed.…”
Section: Related Workmentioning
confidence: 99%
“…Mazzariello and Bifulco in their study 20 Gowrison et al in their study 22 have compared some types of classification algorithms for intrusion detection systems. As the obtained results show, the computation time of rule-based algorithms is less than neural network-based classification methods.…”
Section: Intrusion Detection Systems Taxonomy Based On Their Locationmentioning
confidence: 99%
“…Ram in one study 21 has presented a mutual agent-based method to detect the distributed service denial attack in cloud computing. In this method, the intrusion detection system mod- Gowrison et al in their study 22 have compared some types of classification algorithms for intrusion detection systems. As the obtained results show, the computation time of rule-based algorithms is less than neural network-based classification methods.…”
Section: Related Workmentioning
confidence: 99%
“…Few proposals [3,5] give intuition on how to enrich alerts with relevant information, but do not provide a systematic approach for gathering such information. Some approaches in the field of anomaly-based intrusion detection [17,18,19] provide attack classifications of alerts. However, these approaches are mainly tailored for the analysis of network traffic and are not suitable for the analysis of database activities.…”
Section: Introductionmentioning
confidence: 99%