2018
DOI: 10.7212/zkufbd.v8i1.998
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Abstract: abnormal circumstances while monitoring the systems and target to take the necessary precaution. Attack detection mechanisms used by IDS are basically divided into two. These are signature-based methods and anomaly based methods. Signature-based methods are used more for known intrusion types prevalently. Anomaly based methods model the normal behavior of the network and determines abnormal circumstances through the obtained model of normal state. Anomaly based methods are preferred more as they are more succe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 4 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?