2011
DOI: 10.5121/ijnsa.2011.3406
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Header Matching Algorithm For Intrusion Detection Systems

Abstract: The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that still suffers from performance degradation due the increase of the link speed in today's networks. In This paper we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Swatch and Logsurfer use also sys-log to detect malicious packets. In these other ones, pattern matchings applied [2], [3], [5], effective signature generation methods [9] and other techniques are developed. These types of IDS can judge recent sessions which are almost known attack methods and are already analyzed.…”
Section: Intrusion Detection Systems and Their Weaknessmentioning
confidence: 99%
“…Swatch and Logsurfer use also sys-log to detect malicious packets. In these other ones, pattern matchings applied [2], [3], [5], effective signature generation methods [9] and other techniques are developed. These types of IDS can judge recent sessions which are almost known attack methods and are already analyzed.…”
Section: Intrusion Detection Systems and Their Weaknessmentioning
confidence: 99%
“…Swatch and Logsurfer use also sys-log to detect malicious packets. In these other ones, pattern matchings applied [2], [3], [5], effective signature generation methods [9] and other techniques are developed. These types of IDS can judge recent sessions which are almost known attack methods and are already analyzed.…”
Section: Intrusion Detection Systems and Their Weaknessmentioning
confidence: 99%
“…In signature-based IDS,characteristic of intrusion packets are stored as signaturesin a database [1][2] [4][10] [14]. By comparing contents of captured packetswith the signatures, intrusion packets can be detected.…”
Section: Introductionmentioning
confidence: 99%