2008 the Third International Conference on Internet Monitoring and Protection 2008
DOI: 10.1109/icimp.2008.24
|View full text |Cite
|
Sign up to set email alerts
|

A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…The maximum range for the D function relies on the range of programme P, which is defined as SET {malicious, genial} [16].…”
Section: Approaches To Malware Detection and Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…The maximum range for the D function relies on the range of programme P, which is defined as SET {malicious, genial} [16].…”
Section: Approaches To Malware Detection and Analysismentioning
confidence: 99%
“…D detects the malware on the basis of the machine code, which stores the particulars, or the 'signature', of the malware. The investigation may yield one of three outcomes: false positive, false negative or the hit ratio [16].…”
Section: Approaches To Malware Detection and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The security issues generally depend on traffic load, the size of network, security procedures implemented, etc. Neelakantan [20] stated that network intrusion detection systems must process lot of network data in a short time, these systems require a good deal of processing power, high random access memory (RAM) and large space to log information for any signature based intrusion detection systems. Simon Edwards [5] states that many deployments result in missed intrusions and network vulnerabilities.…”
Section: Host Network and Stegano Idsmentioning
confidence: 99%