2014
DOI: 10.1007/978-3-662-43862-6_19
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Network Intrusion Detection by Correlation of Modularly Hashed Sketches

Abstract: Abstract. The rapid development of network technologies entails an increase in traffic volume and attack count. The associated increase in computational complexity for methods of deep packet inspection has driven the development of behavioral detection methods. These methods distinguish attackers from valid users by measuring how closely their behavior resembles known anomalous behavior. In real-life deployment, an attacker is flagged only on very close resemblance to avoid false positives. However, many attac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 12 publications
0
1
0
Order By: Relevance
“…A NwCSA system relies on information from intrusion detection systems (IDS), antiviruses, malware detectors, logs, flows and other information sources. This raw information is transformed into events that are further processed [4], [5]. The number of 978-1-5386-3416-5/18/$31.00 c 2018 IEEE events is however still too high, and their processing is too labor-intensive to be processed manually.…”
Section: Network-wide Cyber Situational Awarenessmentioning
confidence: 99%
“…A NwCSA system relies on information from intrusion detection systems (IDS), antiviruses, malware detectors, logs, flows and other information sources. This raw information is transformed into events that are further processed [4], [5]. The number of 978-1-5386-3416-5/18/$31.00 c 2018 IEEE events is however still too high, and their processing is too labor-intensive to be processed manually.…”
Section: Network-wide Cyber Situational Awarenessmentioning
confidence: 99%