2007
DOI: 10.1007/978-3-540-74827-4_18
|View full text |Cite
|
Sign up to set email alerts
|

Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Artificial Intelligence (AI) approaches and data mining techniques to construct a better IDS. Bayesian approach has been one of the major AI approaches utilized by the researchers in the network security domain [3][4][5][6][7][8][9][10][11][12][13] .…”
Section: Related Work: Researchers Have Utilized Variousmentioning
confidence: 99%
“…Artificial Intelligence (AI) approaches and data mining techniques to construct a better IDS. Bayesian approach has been one of the major AI approaches utilized by the researchers in the network security domain [3][4][5][6][7][8][9][10][11][12][13] .…”
Section: Related Work: Researchers Have Utilized Variousmentioning
confidence: 99%
“…On the basis of the detection methods, these detection systems can be classified as misuse-based NIDS (or signature-based NIDS) 3,4 and anomaly based NIDS. 5,6 The former aims to detect an attack by comparing incoming packets with its predefined signatures, which is a kind of description for known threats. The latter aims to find an anomaly by identifying obvious deviation between current events and predefined normal profile, which can be used to represent a normal connection or a normal event.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the rapid development of Internet of Things (IoT), there is a need for detecting malicious network events via NIDSs. On the basis of the detection methods, these detection systems can be classified as misuse‐based NIDS (or signature‐based NIDS ) 3,4 and anomaly based NIDS 5,6 . The former aims to detect an attack by comparing incoming packets with its predefined signatures, which is a kind of description for known threats.…”
Section: Introductionmentioning
confidence: 99%