2017
DOI: 10.1109/jsyst.2015.2418434
|View full text |Cite
|
Sign up to set email alerts
|

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0
5

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(24 citation statements)
references
References 23 publications
0
19
0
5
Order By: Relevance
“…Thus, analyzing electronic evidence in internet pyramid selling becomes very important and crucial. Many researchers analyzed the electronic evidence analysis process of internet pyramid selling, but there are few data forensics models [6,7].…”
Section: Realted Workmentioning
confidence: 99%
“…Thus, analyzing electronic evidence in internet pyramid selling becomes very important and crucial. Many researchers analyzed the electronic evidence analysis process of internet pyramid selling, but there are few data forensics models [6,7].…”
Section: Realted Workmentioning
confidence: 99%
“…An application‐layer IIDPS is developed in the works of Leu et al using data mining and forensic techniques for detection of insider attacks. Operating system–level system calls (SC) are extracted from computer usage history to mine SC patterns of a normal user.…”
Section: Related Workmentioning
confidence: 99%
“…As shown in Figure , if PLIDS is used along with ALIDS, which has complexity O ( n 6 ), then for PLIDS, at τ =0, TR+=100% (Figure 6) for which all the intrusions will be detected by PLIDS and ALIDS will remain idle. In this case, the total number of instructions executed will be (2.5+0)×10 6 =2.5×10 6 .…”
Section: Asymptotic Performance Comparisons and Computational Gainsmentioning
confidence: 99%
See 1 more Smart Citation
“…Pessoas ganham benefícios e companhias geram lucro gerenciando seus recursos e transações através da rede, criando maiores oportunidades para usuários maliciosos roubarem informações pessoais e secretas. SegundoLeu et al (2015), nos últimos anos diversas estatísticas mostram um número crescente de invasões reportadas no Symantec Global Internet Security Threat Report.Um sistema de detecção de intrusão (IDS -Intrusion Detection System) é um sistema utilizado para monitorar as atividades de outro sistema ou de uma rede, procurando por atividades maliciosas e produzindo mensagens de alerta para a estação de controle, conformeTan et al (2014). Um IDS consiste de dois componentes: detecção por assinaturas e detecção por anomalias.…”
unclassified