Detecting attacks disguised by evasion techniques is a challenge for signature-based Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs). This study …
Intrusion Detection Systems (IDSs) are one of the key components for securing computing infrastructures. Their objective is to protect against attempts to violate defense mechanisms …
Undoubtedly, dealing with security issues is one of the most important and complex tasks various networks face today. A large number of security algorithms have been proposed to …
P Jiang, Y Ji, X Wang, J Zhu… - IEEE Transactions On …, 2013 - ieeexplore.ieee.org
Unmanned navigation of vehicles and mobile robots can be greatly simplified by providing environmental intelligence with dispersed wireless sensors. The wireless sensors can work …
H Kılıç, NS Katal, AA Selçuk - 2019 4th International …, 2019 - ieeexplore.ieee.org
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) are the first line of the defense of cyber-environment. This technology is made for capturing and preventing …
D Ficara, A Di Pietro, S Giordano… - IEEE/ACM …, 2010 - ieeexplore.ieee.org
Bloom Filters are efficient randomized data structures for membership queries on a set with a certain known false positive probability. Counting Bloom Filters (CBFs) allow the same …
M Särelä, T Kyöstilä, T Kiravuo… - International Journal of …, 2017 - Wiley Online Library
Intrusion prevention systems have become a common security measure in the past 20 years. Their promise is the possibility to prevent known attacks against vulnerable, unpatched …
Signature based Network Intrusion Detection Systems (NIDS) apply a set of rules to identify hostile traffic in network segments. Currently they are so effective detecting known attacks …
RS Stites, CD Botkin, BK Campbell - US Patent 8,458,796, 2013 - Google Patents
Methods and systems are provided for hardware-based pattern matching. In an embodiment, an intrusion-prevention system (IPS) identifies a full match between a subject …