2017
DOI: 10.5121/ijnsa.2017.9601
|View full text |Cite
|
Sign up to set email alerts
|

Effectiveness and Weakness of Quantified/Automated Anomaly Based IDs

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…However, the main disadvantage of the system is that it can only detect known attacks, the need to regularly update the characteristics (signature samples) of new attacks. Besides, the detection time increases as the ruleset grows [2].…”
Section: A An Intrusion Detection Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the main disadvantage of the system is that it can only detect known attacks, the need to regularly update the characteristics (signature samples) of new attacks. Besides, the detection time increases as the ruleset grows [2].…”
Section: A An Intrusion Detection Systemmentioning
confidence: 99%
“…The advantage of this system is that it is effective in detecting unknown risks. However, due to the complexity in the machine learning algorithms applied to detect anomalous data, these systems require a lot of resources and processing time [2]. Currently, this approach is attracting a lot of attention from researchers to optimize this operating model.…”
Section: A An Intrusion Detection Systemmentioning
confidence: 99%