메뉴 건너뛰기




Volumn 81, Issue 6, 2015, Pages 981-999

Improving network intrusion detection system performance through quality of service configuration and parallel technology

Author keywords

Intrusion detection system; Intrusion protection system; Network security; Parallel processing; Quality of Service; Switch configuration

Indexed keywords

CATALYSTS; COMPUTER CRIME; HIGH SPEED NETWORKS; INTRUSION DETECTION; NETWORK SECURITY; SOFTWARE DESIGN;

EID: 84928269589     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2014.12.012     Document Type: Article
Times cited : (81)

References (35)
  • 1
    • 84897913321 scopus 로고    scopus 로고
    • A survey of emerging threats in cybersecurity
    • J. Jang-Jaccard, and S. Nepal A survey of emerging threats in cybersecurity J. Comput. Syst. Sci. 80 5 2014 973 993
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.5 , pp. 973-993
    • Jang-Jaccard, J.1    Nepal, S.2
  • 2
    • 27644509266 scopus 로고    scopus 로고
    • Intrusion detection systems and intrusion prevention systems
    • Accessed September 14, 2013
    • A. Fuchsberger Intrusion detection systems and intrusion prevention systems Inf. Secur. Tech. Rep. 10 2005 134 139 http://www.sciencedirect.com.lcproxy.shu.ac.uk/science/article/pii/S1363412705000415 Accessed September 14, 2013
    • (2005) Inf. Secur. Tech. Rep. , vol.10 , pp. 134-139
    • Fuchsberger, A.1
  • 9
    • 83455235904 scopus 로고    scopus 로고
    • Current intrusion detection techniques in information technology - a detailed analysis
    • G.M. Nazer, and A.A.L. Selvakumar Current intrusion detection techniques in information technology - a detailed analysis Eur. J. Sci. Res. 65 2011 611 624
    • (2011) Eur. J. Sci. Res. , vol.65 , pp. 611-624
    • Nazer, G.M.1    Selvakumar, A.A.L.2
  • 10
    • 84862510240 scopus 로고    scopus 로고
    • Feasibility of intrusion detection system with high performance computing: a survey
    • S. Beg, U. Naru, M. Ashraf, and S. Moshin Feasibility of intrusion detection system with high performance computing: a survey Int. J. Adv. Comput. Sci. 1 2010 26 35
    • (2010) Int. J. Adv. Comput. Sci. , vol.1 , pp. 26-35
    • Beg, S.1    Naru, U.2    Ashraf, M.3    Moshin, S.4
  • 11
  • 12
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: existing solutions and latest technological trends
    • A. Patcha, and J. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 51 2007 3448 3470
    • (2007) Comput. Netw. , vol.51 , pp. 3448-3470
    • Patcha, A.1    Park, J.2
  • 13
    • 19944424800 scopus 로고    scopus 로고
    • Real-time intrusion detection for high-speed networks
    • W. Jiang, H. Song, and Y. Dai Real-time intrusion detection for high-speed networks Comput. Secur. 24 2005 287 294
    • (2005) Comput. Secur. , vol.24 , pp. 287-294
    • Jiang, W.1    Song, H.2    Dai, Y.3
  • 14
    • 84861492152 scopus 로고    scopus 로고
    • A study of methodologies used in intrusion detection and prevention system (IDPS)
    • D. Mudzingwa, and R. Agrawal A study of methodologies used in intrusion detection and prevention system (IDPS) Proceedings of IEEE Southeastcon 2012 1 6
    • (2012) Proceedings of IEEE Southeastcon , pp. 1-6
    • Mudzingwa, D.1    Agrawal, R.2
  • 15
    • 84928289743 scopus 로고    scopus 로고
    • Accessed July 17
    • Cisco Systems Cisco ASA 5585-X adaptive security appliance n.d. http://www.cisco.com/c/en/us/products/collateral/security/asa-5500-series-next-generation-firewalls/product-data-sheet0900aecd802930c5.html 2014 Accessed July 17
    • (2014) Cisco ASA 5585-X adaptive security appliance
    • Systems, C.1
  • 16
    • 85006406611 scopus 로고    scopus 로고
    • Intrusion Assurance Technology Analysis Center, Herndon, VA sixth ed. 2009 Accessed September 15, 2013
    • T.M. Wu Intrusion Detection Systems Intrusion Assurance Technology Analysis Center, Herndon, VA sixth ed. 2009 http://iac.dtic.mil/csiac/download/intrusion-detection.pdf 2009 Accessed September 15, 2013
    • (2009) Intrusion Detection Systems
    • Wu, T.M.1
  • 18
    • 84871900133 scopus 로고    scopus 로고
    • An implementation of intrusion detection system using genetic algorithm
    • M.S. Hoque, M.A. Mukit, and M.A. Bikas An implementation of intrusion detection system using genetic algorithm Int. J. Netw. Secur. Appl. IV 2012 111 112
    • (2012) Int. J. Netw. Secur. Appl. , vol.4 , pp. 111-112
    • Hoque, M.S.1    Mukit, M.A.2    Bikas, M.A.3
  • 23
    • 50649101834 scopus 로고    scopus 로고
    • Accessed October 20
    • Cisco Systems Quality of service design overview n.d. http://www.cisco.com/en/US/docs/solutions/Enterprise/WAN-and-MAN/QoS-SRND/QoSIntro.html 2013 Accessed October 20
    • (2013) Quality of service design overview
    • Systems, C.1
  • 27
    • 84893970507 scopus 로고    scopus 로고
    • Intrusion detection tools and techniques-a survey
    • K.R. Karthikeyan, and A. Indra Intrusion detection tools and techniques-a survey Int. J. Comput. Theory Eng. 2 2010 901 906
    • (2010) Int. J. Comput. Theory Eng. , vol.2 , pp. 901-906
    • Karthikeyan, K.R.1    Indra, A.2
  • 28
    • 84919964294 scopus 로고    scopus 로고
    • A brief study and comparison of Snort and Bro Open source network intrusion detection system
    • P. Mehra A brief study and comparison of Snort and Bro Open source network intrusion detection system Int. J. Adv. Res. Comput. Commun. Eng. 1 6 2012 383 386
    • (2012) Int. J. Adv. Res. Comput. Commun. Eng. , vol.1 , Issue.6 , pp. 383-386
    • Mehra, P.1
  • 29
    • 57349136699 scopus 로고    scopus 로고
    • Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme
    • K. Salah, and A. Qahtan Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme Comput. Commun. 32 1 2009 179 188
    • (2009) Comput. Commun. , vol.32 , Issue.1 , pp. 179-188
    • Salah, K.1    Qahtan, A.2
  • 35
    • 84897916695 scopus 로고    scopus 로고
    • Internet traffic clustering with side information
    • Y. Wang, Y. Xiang, J. Zhang, W. Zhou, and B. Xie Internet traffic clustering with side information J. Comput. Syst. Sci. 80 5 2014 1021 1036
    • (2014) J. Comput. Syst. Sci. , vol.80 , Issue.5 , pp. 1021-1036
    • Wang, Y.1    Xiang, Y.2    Zhang, J.3    Zhou, W.4    Xie, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.