2001
DOI: 10.1016/s0167-4048(01)00806-9
|View full text |Cite
|
Sign up to set email alerts
|

A comparison of Intrusion Detection systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0
1

Year Published

2003
2003
2021
2021

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(47 citation statements)
references
References 5 publications
0
44
0
1
Order By: Relevance
“…Some developments like the one presented in this paper could be use to update the detection engine with one released rule at a time without the handicap of long vulnerable windows due to the updating method of packaged rules. In [12] some drawbacks of misuse based approaches are examined, as the need of regularly updating a knowledge base in order to add new intrusion scenarios, work that must be performed by experts or system designers. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 …”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
“…Some developments like the one presented in this paper could be use to update the detection engine with one released rule at a time without the handicap of long vulnerable windows due to the updating method of packaged rules. In [12] some drawbacks of misuse based approaches are examined, as the need of regularly updating a knowledge base in order to add new intrusion scenarios, work that must be performed by experts or system designers. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 …”
Section: A C C E P T E D Accepted Manuscriptmentioning
confidence: 99%
“…Statistics is the most widely used technique, which defines normal behavior by collecting data relating to the behavior of legitimate users over a period of time [3]. The representative IDS based on statistics is NIDES (Next-generation Intrusion Detection Expert Systems), which measures the similarity between a subject's long-term behavior and short term behavior for intrusion detection [8].…”
Section: Related Workmentioning
confidence: 99%
“…An Intrusion Detection System (IDS) is a security tool that acts as a defensive line against attackers [1,2]. There are many vulnerabilities in a computer network.…”
Section: Introductionmentioning
confidence: 99%