2021
DOI: 10.1109/access.2021.3055431
|View full text |Cite
|
Sign up to set email alerts
|

DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems

Abstract: and supported by the National University of Malaysia for conducting experiments and publishing papers.ABSTRACT Deoxyribonucleic acid (DNA) can be used to discover the presence of diseases in the human body. Similarly, its functionality can be leveraged in an intrusion detection system (IDS) to detect attacks against computer systems and network traffic. Various approaches have been proposed for using DNA sequences in IDSs. The most popular is the DNA sequence matching method, which is also used in biology. A t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Different from other security products, intrusion detection system needs more intelligence. It must analyze the obtained data and draw useful results [13][14][15]. As a security technology, the main purpose of an intrusion detection system is to: first, identify intruders; second, identify intrusion behavior; third, detect and monitor successful security breakthroughs; fourth, provide important information in time to resist invasion and prevent the occurrence and expansion of events [16][17][18].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Different from other security products, intrusion detection system needs more intelligence. It must analyze the obtained data and draw useful results [13][14][15]. As a security technology, the main purpose of an intrusion detection system is to: first, identify intruders; second, identify intrusion behavior; third, detect and monitor successful security breakthroughs; fourth, provide important information in time to resist invasion and prevent the occurrence and expansion of events [16][17][18].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Rashid et al [8] introduced two distinct DNA-encoding techniques known as DEM3sel and DEMdif, each possessing unique characteristics pertaining to the length of the DNA sequence and the manner in which network traffic is represented. Specifically, DEM3sel employs three characters to signify all 41 network attributes, while employing a single predetermined character to differentiate between nominal and numerical attributes.…”
Section: Related Workmentioning
confidence: 99%