2013
DOI: 10.1109/tkde.2012.241
|View full text |Cite
|
Sign up to set email alerts
|

Signature-Based Detection of Notable Transitions in Numeric Data Streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 48 publications
0
3
0
Order By: Relevance
“…This restriction can be partially solved by deploying an automated signature creator attached to the SDB systems . The signature creator can be generated from collecting and analyzing constituents of frequent or consistent behaviors . However, the limitation of this solution is that current algorithms cannot fully detect all malicious instances.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…This restriction can be partially solved by deploying an automated signature creator attached to the SDB systems . The signature creator can be generated from collecting and analyzing constituents of frequent or consistent behaviors . However, the limitation of this solution is that current algorithms cannot fully detect all malicious instances.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…However, the limitation of this solution is that current algorithms cannot fully detect all malicious instances. Most approaches addressing this issue determine the suspicious traffic by analyzing the data streams' reflections , which cannot entirely secure the outcomes.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…The Packet Processor first retrieves the contents from the payload of the HTTP packet. The payload contents should be matched against the signature database which contains the signature of the SQL injection attacks that will be detected by the program [17]. The contents of the signature database contains various keywords such as UNION and few specific SQL functions such as INTERVAL(…) which can form SQL injection attacks.…”
Section: System Architecturementioning
confidence: 99%