메뉴 건너뛰기




Volumn 19, Issue 5, 2017, Pages 675-683

Design and implementation of an intrusion prevention system

Author keywords

Artificial immune system; Intrusion detection system; Intrusion prevention system; Security systems

Indexed keywords

IMMUNE SYSTEM; SECURITY SYSTEMS;

EID: 85051044748     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: 10.6633/IJNS.201709.19(5).04     Document Type: Article
Times cited : (26)

References (30)
  • 1
    • 84994033247 scopus 로고    scopus 로고
    • 'Using classification algorithms in building models for network intrusion detection,'
    • M. Aljabr, "Using classification algorithms in building models for network intrusion detection," Interna-tional Journal on Numerical and Analytical Methods in Engineering, vol. 3, no. 3, pp. 57-62, 2015
    • (2015) Interna-tional Journal on Numerical and Analytical Methods in Engineering , vol.3 , Issue.3 , pp. 57-62
    • Aljabr, M.1
  • 2
    • 84944457802 scopus 로고    scopus 로고
    • 'Conception, design and implementation of secured uav combining multi-agent systems and ubiquitous lightweight idps (intrusion detection and prevention system),'
    • K. Boukhdir, A. Boualam, S. Tallaland H. Medromi, and S. Benhadou, "Conception, design and implementation of secured uav combining multi-agent systems and ubiquitous lightweight idps (intrusion detection and prevention system)," International Jour-nal on Engineering Applications, vol. 3, no. 1, pp. 1-5, 2015
    • (2015) International Jour-nal on Engineering Applications , vol.3 , Issue.1 , pp. 1-5
    • Boukhdir, K.1    Boualam, A.2    Tallaland, H.3    Medromi, S.4    Benhadou, S.5
  • 4
    • 85011561152 scopus 로고    scopus 로고
    • 'An introduction to the artificial immune systems,'
    • L. N. De Castro, "An introduction to the artificial immune systems," in Handbook of Natural Comput-ing, pp. 1575-1597, 2012
    • (2012) Handbook of Natural Comput-ing , pp. 1575-1597
    • De Castro, L.N.1
  • 5
    • 71649110512 scopus 로고    scopus 로고
    • 'Artificial immune systems as a novel soft computing paradigm,'
    • L. N. De Castro and J. I. Timmis, "Artificial immune systems as a novel soft computing paradigm," Soft Computing, vol. 7, no. 8, pp. 526-544, 2003
    • (2003) Soft Computing , vol.7 , Issue.8 , pp. 526-544
    • De Castro, L.N.1    Timmis, J.I.2
  • 7
    • 0037245203 scopus 로고    scopus 로고
    • 'The construction of a boolean competitive neural network using ideas from immunology,'
    • L. N. De Castro, F. J. Von Zuben, and G. A. de Deus, "The construction of a boolean competitive neural network using ideas from immunology," Neurocom-puting, vol. 50, pp. 51-85, 2003
    • (2003) Neurocom-puting , vol.50 , pp. 51-85
    • De Castro, L.N.1    Von Zuben, F.J.2    de Deus, G.A.3
  • 11
    • 84922832566 scopus 로고    scopus 로고
    • 'A review: Mobile ad hoc networks challenges, attacks, security, vulnerability and routing protocols,'
    • M. Enshaei, Z. M. Hanapi, and M. Othman, "A review: Mobile ad hoc networks challenges, attacks, security, vulnerability and routing protocols," Inter-national Journal on Communications Antenna and Propagation, vol. 4, no. 5, pp. 168-179, 2014
    • (2014) Inter-national Journal on Communications Antenna and Propagation , vol.4 , Issue.5 , pp. 168-179
    • Enshaei, M.1    Hanapi, Z.M.2    Othman, M.3
  • 14
    • 85014388994 scopus 로고    scopus 로고
    • 'Model of an effective intrusion detection system on the LAN,'
    • Y. Farhaoui and A. Asimi, "Model of an effective intrusion detection system on the LAN," International Journal of Computer Applications, vol. 41, no. 11, pp. 26-29, 2012
    • (2012) International Journal of Computer Applications , vol.41 , Issue.11 , pp. 26-29
    • Farhaoui, Y.1    Asimi, A.2
  • 18
    • 84947578308 scopus 로고    scopus 로고
    • 'Designing an adversarial model against reactive and proactive routing protocols in manets: A comparative performance study,'
    • A. P Gopi, E. S. Babu, and C. N. Rajuand S. A. Kumar, "Designing an adversarial model against reactive and proactive routing protocols in manets: A comparative performance study," International Journal of Electrical and Computer Engineering, vol. 5, no. 5, 2015
    • (2015) International Journal of Electrical and Computer Engineering , vol.5 , Issue.5
    • Gopi, A.P.1    Babu, E.S.2    Rajuand, C.N.3    Kumar, S.A.4
  • 20
    • 85014085189 scopus 로고    scopus 로고
    • 'An improved privacy protection security protocol based on NFC,'
    • Jan
    • L. Jie, W. Ying, and W. F. Chen, "An improved privacy protection security protocol based on NFC," International Journal of Network Security, vol. 19, no. 1, pp. 39-46, Jan. 2017
    • (2017) International Journal of Network Security , vol.19 , Issue.1 , pp. 39-46
    • Jie, L.1    Ying, W.2    Chen, W.F.3
  • 21
    • 84960105209 scopus 로고    scopus 로고
    • 'Novel roadm modelling with wss and obs to improve routing performance in optical network,'
    • G. R. Kavitha and T. S. Indumathi, "Novel roadm modelling with wss and obs to improve routing performance in optical network," International Journal of Electrical and Computer Engineering, vol. 6, no. 2, pp. 700, 2016
    • (2016) International Journal of Electrical and Computer Engineering , vol.6 , Issue.2 , pp. 700
    • Kavitha, G.R.1    Indumathi, T.S.2
  • 27
    • 85014078012 scopus 로고    scopus 로고
    • 'Automatic generation of security protocol implementations written in java from abstract speci-fications proved in the computational model,'
    • B. Meng, C. T. Huang, Y. Yang, L. Niu, and D.Wang, "Automatic generation of security protocol implementations written in java from abstract speci-fications proved in the computational model," Inter-national Journal of Network Security, vol. 19, no. 1, pp. 138-153, 2017
    • (2017) Inter-national Journal of Network Security , vol.19 , Issue.1 , pp. 138-153
    • Meng, B.1    Huang, C.T.2    Yang, Y.3    Niu, L.4    Wang, D.5
  • 30
    • 84871859848 scopus 로고    scopus 로고
    • "Applying similarities between immune systems and mobile agent systems in intrusion detection,"
    • Citeseer
    • M. Zielinski and L. Venter, "Applying similarities between immune systems and mobile agent systems in intrusion detection," in ISSA, pp. 1-12. Citeseer, 2004. (http://icsa.cs.up.ac.za/issa/ 2004/Proceedings/Full/016.pdf)
    • (2004) ISSA , pp. 1-12
    • Zielinski, M.1    Venter, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.