2010
DOI: 10.1504/ijsn.2010.037660
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Intrusion Detection System with proximity information

Abstract: Abstract:The wide spread of worms poses serious challenges to today's Internet. Various IDSes (Intrusion Detection Systems) have been proposed to identify or prevent such spread. These IDSes can be largely classified as signature-based or anomaly-based ones depending on what type of knowledge the system knows. Signature-based IDSes are unable to detect the outbreak of new and unidentified worms when the worms' characteristic patterns are unknown. In addition, new worms are often sufficiently intelligent to hid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…IPI can be measured from sensors implanted in the body parts or externally without much variation. There are many other related security aspects (Abbes et al, 2010;Chen et al, 2010;Schrader et al, 2010;Zhuang et al, 2010;Kundur et al, 2011;Kalogridis et al, 2011;Li et al, 2011;Ramsey et al, 2011;Xiao, 2011;Zhang and Gunter, 2011).…”
Section: Security and Interferencementioning
confidence: 99%
“…IPI can be measured from sensors implanted in the body parts or externally without much variation. There are many other related security aspects (Abbes et al, 2010;Chen et al, 2010;Schrader et al, 2010;Zhuang et al, 2010;Kundur et al, 2011;Kalogridis et al, 2011;Li et al, 2011;Ramsey et al, 2011;Xiao, 2011;Zhang and Gunter, 2011).…”
Section: Security and Interferencementioning
confidence: 99%
“…There are many related research studies in the following topics: various attacks and vulnerabilities , key management , traceback , elliptic curve cryptosystem intrusion detection , radio frequency identification security , security in wireless networks , trust , authentication , security in peer‐to‐peer networks , and other security issues .…”
Section: Introductionmentioning
confidence: 99%
“…Our other related work includes temporal accountability , accountability for wireless networks , logging , accountability in smart grids , and quantitative study of accountability . There are also many related work in network security .…”
Section: Introductionmentioning
confidence: 99%