메뉴 건너뛰기




Volumn , Issue , 2012, Pages

A study of methodologies used in intrusion detection and prevention systems (IDPS)

Author keywords

Anomaly Based Detection; Hybrid Based Detection; Intrusion Detection and Prevention Systems (IDPS); Signature Based Detection; Stateful Protocol Analysis Based Detection

Indexed keywords

COMPUTER NETWORKS; HYBRID SYSTEMS; INTRUSION DETECTION; NETWORK SECURITY;

EID: 84861492152     PISSN: 10910050     EISSN: 1558058X     Source Type: Conference Proceeding    
DOI: 10.1109/SECon.2012.6197080     Document Type: Conference Paper
Times cited : (40)

References (22)
  • 1
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks
    • August
    • Animesh Patcha, Jung-Min Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks," The International Journal of Computer and Telecommunications Networking, Vol.51, No.12, August, 2007, pp.3448-3470.
    • (2007) The International Journal of Computer and Telecommunications Networking , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 2
    • 0342600000 scopus 로고    scopus 로고
    • An introduction to intrusion detection and assessment for system and network security management
    • Rebecca Bace, "An introduction to intrusion detection and assessment for system and network security management." ICSA Intrusion Detection Systems Consortium Technical Report, 1999.
    • (1999) ICSA Intrusion Detection Systems Consortium Technical Report
    • Bace, R.1
  • 4
    • 33746150390 scopus 로고    scopus 로고
    • Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
    • Tarek S. Sobh, "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art," Computer Standards & Interfaces 28, 2006, pp. 670- 694.
    • (2006) Computer Standards & Interfaces , vol.28 , pp. 670-694
    • Sobh, T.S.1
  • 6
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: A review
    • Shelly X. Wu, Wolfgang Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing Journal 10, 2010, pp. 1-35.
    • (2010) Applied Soft Computing Journal , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 7
    • 68949196337 scopus 로고    scopus 로고
    • A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
    • Xuan D. Hoang, Jiankun Hu, Peter Bertok, "A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Net- work and Computer Applications 32, 2009, pp. 1219-1228.
    • (2009) Journal of Net- Work and Computer Applications , vol.32 , pp. 1219-1228
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3
  • 8
    • 79960556588 scopus 로고    scopus 로고
    • Alert correlation in collaborative intelligent intrusion detection systems - A survey
    • Elshoush H. Tagelsir, Izzeldin M. Osman, "Alert correlation in collaborative intelligent intrusion detection systems - A survey." Applied Soft Computing 11, 2011, pp. 4349-4365.
    • (2011) Applied Soft Computing , vol.11 , pp. 4349-4365
    • Tagelsir, E.H.1    Osman, I.M.2
  • 9
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • Shanbhag, Shashank, Tilman Wolf. "Accurate anomaly detection through parallelism." IEEE Network 23.1, 2009, pp. 22-28.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 15
    • 69249230890 scopus 로고    scopus 로고
    • Intrusion detection by machine learning: A review
    • December
    • Chih-Fong Tsai, YuFeng Hsu, Chia-Ying Lin, W.Y.Lin, "Intrusion detection by machine learning: A review," Expert Systems with Applications, Vol 36, No.10. December 2009, pp.11994-12000.
    • (2009) Expert Systems with Applications , vol.36 , Issue.10 , pp. 11994-12000
    • Tsai, C.-F.1    Hsu, Y.F.2    Lin, C.-Y.3    Lin, W.Y.4
  • 18
    • 84861520518 scopus 로고    scopus 로고
    • A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
    • Indraneel Mukhopadhyay, Mohuya Chakraborty and Satyajit Chakrabarti, "A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems," Journal of Information Security, Vol. 2 No. 1, pp. 28-38.
    • Journal of Information Security , vol.2 , Issue.1 , pp. 28-38
    • Mukhopadhyay, I.1    Chakraborty, M.2    Chakrabarti, S.3
  • 19
    • 84882775533 scopus 로고    scopus 로고
    • A Survey of Intrusion Detection Analysis Methods
    • University of California, San Diego, Spring
    • Justin Lee, Stuart Moskovics, Lucas Silacci, "A Survey of Intrusion Detection Analysis Methods," CSE 221, University of California, San Diego, Spring 1999.
    • (1999) CSE , vol.221
    • Lee, J.1    Moskovics, S.2    Silacci, L.3
  • 20
    • 79955763151 scopus 로고    scopus 로고
    • Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
    • Ning Weng, Luke Vespa, Benfano Soewito, "Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system," Computer Networks, Vol. 55, 2011, pp. 1648-1661.
    • (2011) Computer Networks , vol.55 , pp. 1648-1661
    • Weng, N.1    Vespa, L.2    Soewito, B.3
  • 21
    • 62249168871 scopus 로고    scopus 로고
    • A hybrid intrusion detection system design for computer network security
    • Ali M. Aydin, Halim A. Zaim, Gokhan K. Ceylan, "A hybrid intrusion detection system design for computer network security," Computers and Electrical Engineering, Vol. 35, 2009, pp. 517-526.
    • (2009) Computers and Electrical Engineering , vol.35 , pp. 517-526
    • Aydin, A.M.1    Zaim, H.A.2    Ceylan, G.K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.