A hybrid intrusion detection system design for computer network security

MA Aydın, AH Zaim, KG Ceylan - Computers & Electrical Engineering, 2009 - Elsevier
… commonly used signature-based intrusion detection system. Snort is a network intrusion
detection system that runs over IP networks analyzing real-time traffic for detection of misuses [6]…

Network intrusion detection

B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
… A description of a real attack that occurred several months ago and was detected by our
Network Security Monitor (NSM) [17] provides a good example of the types of attacks that occur …

[PDF][PDF] Survey of current network intrusion detection techniques

S Kumar - Washington Univ. in St. Louis, 2007 - cse.wustl.edu
network security has grown tremendously and a number of devices have been introduced to
improve the security of a networkintrusion detection may lead to a high rate of false detection

Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
security threats and challenges for IoT networks by evaluating existing defense techniques.
Our main focus is on network intrusion detection … and open-source network sniffing software. …

[图书][B] The Tao of network security monitoring: beyond intrusion detection

R Bejtlich - 2004 - books.google.com
… in this book, Intrusion Detection provides the history … Network Security Monitoring focuses
on networkbased tactics, you can turn to Intrusion Detection for insight on hostbased detection

Intrusion detection system using deep neural network for in-vehicle network security

MJ Kang, JW Kang - PloS one, 2016 - journals.plos.org
… In this paper, an intrusion detection system using the deep neural network (DNN) structure
[37] is proposed to secure the in-vehicular network, eg. CAN network. The proposed …

Intrusion techniques: Comparative study of network intrusion detection systems

M Garuba, C Liu, D Fraites - Fifth International Conference on …, 2008 - ieeexplore.ieee.org
… organizational security objectives in order to determine the network intrusion detection system
that … It is therefore evident that an incompetent network security personnel correlates to an …

A systematic literature review of intrusion detection system for network security: Research trends, datasets and methods

R Ferdiana - … 4th International Conference on Informatics and …, 2020 - ieeexplore.ieee.org
… studies have revealed that network security is a very important issue in the currently, and
some intrusion detection systems (IDS) have been developed to protect network security [1]. To …

Automatic network intrusion detection: Current techniques and open issues

CA Catania, CG Garino - Computers & Electrical Engineering, 2012 - Elsevier
… , the most commonly used data sets used for evaluation [68], [69] are almost 12 years old,
which make them practically obsolete if we consider the fast evolution of the network security

Network security on the intrusion detection system level

L Vokorokos, A Kleinová, O Latka - … International Conference on …, 2006 - ieeexplore.ieee.org
detection systems (IDS) are one of these solutions. out whether someone tries to attack the
network or the Intrusion detection … used for the stabilization of the network security as well as …