1999
DOI: 10.1016/s0167-4048(99)80131-x
|View full text |Cite
|
Sign up to set email alerts
|

Network based intrusion detection: A review of technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2004
2004
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…The phenomenon of extracting required and needed data (knowledge), like patterns, association, changes, and significant structures a data base which is in the large form 2.2 Areas and fields  Emerging data mining applications in bioinformatics, engineering, and medicine  Image analysis [22].  Noise detection and cleansing in large, distributed data environments  Ontology-based information extraction and knowledge discovery  Pattern discovery in data streams  Pattern matching and mining…”
Section: Definition Of Data Miningmentioning
confidence: 99%
“…The phenomenon of extracting required and needed data (knowledge), like patterns, association, changes, and significant structures a data base which is in the large form 2.2 Areas and fields  Emerging data mining applications in bioinformatics, engineering, and medicine  Image analysis [22].  Noise detection and cleansing in large, distributed data environments  Ontology-based information extraction and knowledge discovery  Pattern discovery in data streams  Pattern matching and mining…”
Section: Definition Of Data Miningmentioning
confidence: 99%
“…Intrusion Detection System (IDS) is software with functions of detecting, identifying, and responding to unauthorized or abnormal activities on a target system [3,4]. The goal of the IDS is to provide a mechanism for the detection of security violations either in real-time or batch-mode [5,6].…”
Section: Detection Systemsmentioning
confidence: 99%
“…Therefore, an IDS has a role similar to that of a firewall, but it also detects internal hacking and malicious codes that the firewall cannot detect and defend against. In addition, the IDS detects and responds to unauthorized activities against target systems that are not certified [4]. Thus, an IDS is an important tool for detecting security violations in real time.…”
Section: Introductionmentioning
confidence: 99%