Advances in Data Mining Knowledge Discovery and Applications 2012
DOI: 10.5772/48308
|View full text |Cite
|
Sign up to set email alerts
|

Mining Complex Network Data for Adaptive Intrusion Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Currently, signature intrusion detection methods are being actively developed (intrusion detection methods based on signatures -templates of typical attacks created based on the headers or contents of network packets [3][4][5][6]. And behavioral methods are based not on models of information attacks, but on models of "normal" functioning [7][8][9][10][11].…”
Section: Figure 1: Classification Of Influence Modelsmentioning
confidence: 99%
“…Currently, signature intrusion detection methods are being actively developed (intrusion detection methods based on signatures -templates of typical attacks created based on the headers or contents of network packets [3][4][5][6]. And behavioral methods are based not on models of information attacks, but on models of "normal" functioning [7][8][9][10][11].…”
Section: Figure 1: Classification Of Influence Modelsmentioning
confidence: 99%
“…Intrusion detection system (IDS) is a security management tool for detecting threats in computer networks. An IDS collects data from various sources within a computer network and then analysis the collected data to find the attacks that include both intrusions (attacks from outside) and misuse (attacks from within) [5], [9].…”
Section: Introductionmentioning
confidence: 99%