2018
DOI: 10.1007/978-981-10-7386-1_19
|View full text |Cite
|
Sign up to set email alerts
|

Wavelets Based Anomaly-Based Detection System or J48 and Naïve Bayes Based Signature-Based Detection System: A Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…That is, if two different attackers use a common tool, the process of this attack is identical in both cases. So, this signature of the known attacks can be used to detect an attack accurately; this is the method used in SIDS [14][15][16]. Here, the system searches the incoming packets for a particular byte sequence, which are the attack signatures.…”
Section: Related Workmentioning
confidence: 99%
“…That is, if two different attackers use a common tool, the process of this attack is identical in both cases. So, this signature of the known attacks can be used to detect an attack accurately; this is the method used in SIDS [14][15][16]. Here, the system searches the incoming packets for a particular byte sequence, which are the attack signatures.…”
Section: Related Workmentioning
confidence: 99%
“…Signature-based IDSs are able to efficiently detect known threats and generally, they scale well. Over the years, many researchers implemented signature-based IDSs [19]- [21]. However, signature-based approaches become obsolete against unknown new or modified attacks.…”
Section: Background and Related Work A Botnet Detectionmentioning
confidence: 99%
“…Kaur, Gagandeep, Amit Bansal, and Arushi Agarwal [16] in this paper, we have compared results of detection techniques for SbDS and AbDS for big datasets. Under AbDS, wavelets have been used as a signal processing tool to compute Hurst Index (H), used as a measure for computing degree of self-similarity in network traffic.…”
Section: Literature Survey On Association Rule Miningmentioning
confidence: 99%