2008
DOI: 10.1007/978-3-540-92295-7_21
|View full text |Cite
|
Sign up to set email alerts
|

A Threat-Aware Anomaly-Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Neelakantan et al . 10 extend the idea given by Reference 8. Reference numbers are used for selection of signatures for the IDS.…”
Section: Related Workmentioning
confidence: 58%
See 3 more Smart Citations
“…Neelakantan et al . 10 extend the idea given by Reference 8. Reference numbers are used for selection of signatures for the IDS.…”
Section: Related Workmentioning
confidence: 58%
“…In the next subsection, we compare Detection Rate and Accuracy of the proposed scheme with Reference 10.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…To enhance the threatawareness capability of the system for the anomaly intrusion detection, S. Neelakantan et al presented a model and architecture. The threat-awareness means the system for anomaly intrusion detection can periodically obtain the changing threats in a network and those specific useful alarms [8]. C. Duma et al proposed a P2Pbased overlay for intrusion detection to deal with the insider threat by using a trust-aware engine to detect the correlating alerts and an adaptive scheme to manage trust [9].…”
Section: Introductionmentioning
confidence: 99%