The 5th Conference on Information and Knowledge Technology 2013
DOI: 10.1109/ikt.2013.6620045
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid intelligent HIDS model using two-layer genetic algorithm and neural network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Controlling the network flow is the responsibility of the network-based defence system. However, a host-based defence system combats against upcoming data in a workstation/computer by a firewall and other defence mechanisms installed on a host [414,415]. As discussed in section II-A, there are four major categories of attacks for instruction detection purposes, including Denial of Service (DoS), Phishing/Scanning/Probe, Remote to Local (R2L), and User to Root (U2R).…”
Section: ) Techniques and Methodsmentioning
confidence: 99%
“…Controlling the network flow is the responsibility of the network-based defence system. However, a host-based defence system combats against upcoming data in a workstation/computer by a firewall and other defence mechanisms installed on a host [414,415]. As discussed in section II-A, there are four major categories of attacks for instruction detection purposes, including Denial of Service (DoS), Phishing/Scanning/Probe, Remote to Local (R2L), and User to Root (U2R).…”
Section: ) Techniques and Methodsmentioning
confidence: 99%
“…Based on the location of the information sources, IDPS can be categorized as host based or network based approach [64]. Host based Intrusion Detection System (HIDS) checks for suspicious activity at the host level [65]. A Network based Intrusion Detection System (NIDS) checks for intrusions in the network traffic at gateway and routers by analyzing network protocol activities [66].…”
Section: Background On Malware and Malware Variantsmentioning
confidence: 99%
“…The misuse detection method, which is used in a signature-based (or knowledge-based) HIDS, is effective in detecting known attack vectors; nevertheless, it is vulnerable to attacks from unknown attack vectors. Therefore, there is a need for the anomaly detection methods [8,9]. In particular, anomaly detection methods define and detect any anomalies that deviate from normal behavior patterns based on existing network usage scenarios, internal system calls, and so on.…”
Section: Introductionmentioning
confidence: 99%