EFM: enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism

W Meng, W Li, LF Kwok - computers & security, 2014 - Elsevier
Signature-based network intrusion detection systems (NIDSs) have been widely deployed in
current network security infrastructure. However, these detection systems suffer from some …

Towards effective trust-based packet filtering in collaborative network environments

W Meng, W Li, LF Kwok - IEEE Transactions on Network and …, 2017 - ieeexplore.ieee.org
Overhead network packets are a big challenge for intrusion detection systems (IDSs), which
may increase system burden, degrade system performance, and even cause the whole …

Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection

Y Meng, LF Kwok - Journal of Network and Computer Applications, 2014 - Elsevier
Network intrusion detection systems (NIDS) are widely deployed in various network
environments. Compared to an anomaly based NIDS, a signature-based NIDS is more …

Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection

Y Meng, W Li, LF Kwok - Computer Networks, 2013 - Elsevier
Network intrusion detection systems (NIDSs), especially signature-based NIDSs, are being
widely deployed in a distributed network environment with the purpose of defending against …

[HTML][HTML] A distributed signature detection method for detecting intrusions in sensor systems

I Kim, D Oh, MK Yoon, K Yi, WW Ro - Sensors, 2013 - mdpi.com
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected
regions. A security solution is strongly recommended to prevent networks against malicious …

A game theoretic model for dynamic configuration of large-scale intrusion detection signatures

XJ Punithan, JD Kim, D Kim, YH Choi - Multimedia Tools and Applications, 2016 - Springer
In this paper, we note that the signature-based intrusion detection system (S-IDS) can cause
the low accuracy against mutants of intrusion packets. This is because the S-IDS commonly …

分布式入侵检测中基于能力与负载的数据分割算法.

张润莲, 李豪, 叶志博, 赵新红 - Application Research of …, 2019 - search.ebscohost.com
针对高速网络环境下分布式入侵检测中海量数据并行检测处理的效率和检测率问题,
提出一种基于能力与负载的数据分割算法. 该算法依据采集到的集群内各数据分析节点的系统 …

BLAST: B‐LAyered bad‐character SHIFT tables for high‐speed pattern matching

YH Choi, SW Seo - IET Information Security, 2013 - Wiley Online Library
In this study, the authors propose a new multi‐pattern matching algorithm, called BLAST (B‐
LAyered bad‐character Shift Tables with a single‐byte search unit), which considers space …

An improved multi-pattern matching algorithm for large-scale pattern sets

Z Peng, Y Wang, J Xue - 2014 Tenth International Conference …, 2014 - ieeexplore.ieee.org
Multi-pattern matching algorithms are broadly used in many fields of computer science.
However, the performance of the existing algorithms seriously degrades with the increasing …

A fast engine for multi-string pattern matching

Z Peng, Y Wang, W Yue - International Journal of Pattern …, 2017 - World Scientific
Multi-string matching (MSM) is a core technique searching a text string for all occurrences of
some string patterns. It is widely used in many applications. However, as the number of …