[引用][C] Magic quadrant for network intrusion prevention system appliances

G Young, J Pescatore - Gartner RAS Core Research Note G, 2009

[PDF][PDF] WIDPS: Wormhole Attack Intrusion Detection and Prevention Security Scheme in MANET

P Verma, S Dhariwal, H Tiwari - International Journal of Computer Applications - Citeseer
… hazard, Black Hole attack and to develop a specification based … In this paper, an efficient
security scheme of to detect and … The simulation of normal AODV, Wormhole attack and IPS

Developing a host intrusion prevention system by using data mining

A Al-hamami, T Alawneh - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
… based IPS that uses data mining technique, namely decision tree, as a detecting mechanism…
Recently data mining started to enter information security field such as intrusion detection [5]…

Recurrent neural network based intrusion detection system

S Nayyar, S Arora, M Singh - 2020 international conference on …, 2020 - ieeexplore.ieee.org
… Existing research in the field of IDS has not been able to categorize DDoS … detect anomalies
in the network traffic and redirecting all malicious requests to a honeypot based black hole

[PDF][PDF] NETWORK INTRUSION PREVENTION SYSTEM TECHNIQUES TO MANAGE DDOS ATTACKS

M Saxena - academia.edu
… Using iBGP as a trigger mechanism, black hole filtering can be remotely … IPS depends
mainly on its detection engine. There are various detection methods that are used in existing IDS’s…

[图书][B] Practical intrusion analysis: prevention and detection for the twenty-first century

R Trost - 2009 - books.google.com
… new intrusion detection strategies consisting of wireless IDS/IPS, network behavioral analysis
(NBA), converging of physical and logical security, and geospatial intrusion detectionhole. …

Normal and malicious sliding windows similarity analysis method for fast and accurate IDS against DoS attacks on in-vehicle networks

S Ohira, AK Desta, I Arai, H Inoue, K Fujikawa - IEEE Access, 2020 - ieeexplore.ieee.org
… These attacks abuse the security hole of In-Vehicle Infotainment … Therefore, it is necessary
to have an IPS that can prevent all … precision and detection time of similaritybased IDS with the …

A detection and prevention technique for man in the middle attack in fog computing

F Aliyu, T Sheltami, EM Shakshuki - Procedia computer science, 2018 - Elsevier
… Gray hole attack is an attack where nodes selectively destroy … and Authentication phases
for IDS and IPS respectively. The … In this paper, an IPS-IDS system is proposed where special …

Internet Home Security

H Mohamed Kher - 2019 - theseus.fi
… As such, both IDS and IPS have anomaly-detection features integrated. Nonetheless, IPS is
… The test shows that the number of queries blocked on the dashboard of Pi-Hole increases …

Data mining techniques for network intrusion detection and prevention systems

ND Harale, DBB Meshram - International Journal of Innovative …, 2016 - papers.ssrn.com
… ) and intrusion prevention system (IPS) that detect attack … suggest that new system security
holes and intrusion methods are … intrusion detection (ID) and intrusion prevention system (IPS) …