2014 5th International Conference on Information and Communication Systems (ICICS) 2014
DOI: 10.1109/iacs.2014.6841978
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection System using attack behavior classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(40 citation statements)
references
References 7 publications
0
31
0
Order By: Relevance
“…The indicators, decreasing protection of MCCS are considered to be risk indicators [24], and those increasing it − protection indicators [4,6]. To formalize the dependency of MCCS's degree of protection on corresponding values, one can apply one of the following approaches [16,19,24]: 1) a cyber threat within a class depends on one indicator, i.e. the relationships of one-to-one correspondence exist between the degree of threat and the values of the indicator (factor);…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
See 3 more Smart Citations
“…The indicators, decreasing protection of MCCS are considered to be risk indicators [24], and those increasing it − protection indicators [4,6]. To formalize the dependency of MCCS's degree of protection on corresponding values, one can apply one of the following approaches [16,19,24]: 1) a cyber threat within a class depends on one indicator, i.e. the relationships of one-to-one correspondence exist between the degree of threat and the values of the indicator (factor);…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
“…To build LPDCA, the so-called elementary classifiers (EC) [16,19,21,28,29] are used. EC is a fragment that briefly describes the object and which is used for training ASDCA.…”
Section: The Model Of Logical Procedures Of Detection Of Anomalies Anmentioning
confidence: 99%
See 2 more Smart Citations
“…Failure to create an accurate model would result in new vulnerabilities being misclassified or legitimate traffic being flagged as malicious [24]. Although the algorithms promise to deliver high detection rations and good performance [2], they are seldom deployed on their own outside academic circles. The current work focuses instead on cluster algorithms: more specifically k-means clustering [14].…”
Section: Network Intrusion and Machine Learningmentioning
confidence: 99%