International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. 2004
DOI: 10.1109/itcc.2004.1286488
|View full text |Cite
|
Sign up to set email alerts
|

Protocol analysis in intrusion detection using decision tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
37
0
1

Year Published

2005
2005
2016
2016

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(40 citation statements)
references
References 4 publications
0
37
0
1
Order By: Relevance
“…Firewall rules: A firewall security policy is a list of ordered filtering rules that define the actions performed on packets that satisfy specific conditions. Before to develop rules filtering by using packet filter, anything have to be considered beforehand how far demarcation which will be applied, because more and more demarcation applied hence increases the search time and space requirements of the packet filtering process [1] and consequences to make downhill performance progressively [11] . This matter because every incoming network packet and go out the network checked beforehand by rules alternately until matching rule found in firewall [12] .…”
Section: Theoretical Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Firewall rules: A firewall security policy is a list of ordered filtering rules that define the actions performed on packets that satisfy specific conditions. Before to develop rules filtering by using packet filter, anything have to be considered beforehand how far demarcation which will be applied, because more and more demarcation applied hence increases the search time and space requirements of the packet filtering process [1] and consequences to make downhill performance progressively [11] . This matter because every incoming network packet and go out the network checked beforehand by rules alternately until matching rule found in firewall [12] .…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…From a security standpoint, it is crucial to be able to distinguish normal activity from the activity of someone to attack server or network [3] . Log files are useful for three reasons [11] :…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Abbess et al [9] proposed a combination of pattern matching and protocol analysis approaches. The first method worked on multi-pattern matching strategy.…”
Section: Related Workmentioning
confidence: 99%
“…A paper by (Abbes, Bouhoula & Rusinowitch, 2004) describes a system using a decision tree in conjunction with protocol analysis. The protocol analysis uses a specification file for the protocol being monitored and performs 'Aho-Corasick' (Aho & Corasick, 1975) string matching on only the appropriate parts of the data stream.…”
Section: Background and Related Workmentioning
confidence: 99%