2014
DOI: 10.1109/mcom.2014.6852093
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-based intrusion detection in encrypted environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g. [132], [138], [147], [171]), or just one type of data (e.g. [70], [100], [165]), or restricted to a specific case (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we evaluate the proposed PLIDS in terms of its ability to differentiate between friendly and hostile communication. Based on a confusion matrix, the following four types of alarms can be generated: 1)True Positive T + when PLIDS correctly detects physical‐layer intrusion. 2)True Negative T − when PLIDS correctly detects no intrusion. 3)False Positive F + when PLIDS incorrectly detects physical‐layer intrusion. 4)False Negative F − when PLIDS incorrectly detects no intrusion. …”
Section: Performance Evaluation and Analysismentioning
confidence: 99%
“…The key challenge is to reliably differentiate between legitimate users and attack traffic. There are two standard approaches used by Intrusion Detection Systems (IDS), these are knowledge-based intrusion detection and behaviour-based intrusion detection [20].…”
Section: A Intrusion Detectionmentioning
confidence: 99%