2009
DOI: 10.1016/j.compeleceng.2008.12.005
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid intrusion detection system design for computer network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
103
0
6

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 246 publications
(110 citation statements)
references
References 11 publications
1
103
0
6
Order By: Relevance
“…Some researchers [18] proposed a hybrid detection approach to increase the capabilities of the current Wireless Intrusion Detection and Prevention System (WIDPS) by amalgamating two intelligent methods of misuse and anomaly. In another effort, a hybrid IDS has been proposed by incorporating the packet header anomaly detection and network traffic anomaly detection systems, which are ananomaly based IDSs with misuse-based IDS Snort [19]. The main goal behind their method is to identify known attacks by misuse while anomaly discovers unknown attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Some researchers [18] proposed a hybrid detection approach to increase the capabilities of the current Wireless Intrusion Detection and Prevention System (WIDPS) by amalgamating two intelligent methods of misuse and anomaly. In another effort, a hybrid IDS has been proposed by incorporating the packet header anomaly detection and network traffic anomaly detection systems, which are ananomaly based IDSs with misuse-based IDS Snort [19]. The main goal behind their method is to identify known attacks by misuse while anomaly discovers unknown attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It provides four essential security functions.These functions include monitoring, analyzing, detecting, and preventing unusual and unauthorized activities [19]. IDPS aims at performing early detection of malicious activity to prevent more severedamage to the protected systems.…”
Section: Idps Functionsmentioning
confidence: 99%
“…The key idea is to aim at taking advantage of classification abilities of neural network for unknown attacks and the expert based system for the known attacks. In the paper [11], a hybrid IDS is proposed. It is obtained by combining packet header anomaly detection (PHAD) and network traffic anomaly detection (NETAD).…”
Section: Related Workmentioning
confidence: 99%
“…In that respect, a conditional branch containing the task DetectBotnetDPI has been added, so that a more thorough detection procedure is carried out for MPF > 0.8, leading to a hybrid detection mechanism (like e.g. the one presented in [63]). In the second branch the initial task MitigateBotnet has been replaced by its alternative MitigateBotnetMPLS.…”
Section: Access Control Rulesmentioning
confidence: 99%