2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229866
|View full text |Cite
|
Sign up to set email alerts
|

General study of intrusion detection system and survey of agent based intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…In contrast, some of its disadvantages are; firstly, they are expensive as it requires lots of management efforts to mount, configure and manage. It is also vulnerable to specific DoS attacks and uses many storage resources to retain audit records to function correctly ( Liu et al., 2019 ; Saxena, Sinha & Shukla, 2017 ). The authors of Arrington et al (2016) use the innovative strength of machine learning such as artificial immune systems to present an interesting host-based IDS.…”
Section: Essential Conceptsmentioning
confidence: 99%
“…In contrast, some of its disadvantages are; firstly, they are expensive as it requires lots of management efforts to mount, configure and manage. It is also vulnerable to specific DoS attacks and uses many storage resources to retain audit records to function correctly ( Liu et al., 2019 ; Saxena, Sinha & Shukla, 2017 ). The authors of Arrington et al (2016) use the innovative strength of machine learning such as artificial immune systems to present an interesting host-based IDS.…”
Section: Essential Conceptsmentioning
confidence: 99%
“…Some researchers focus on HIDS and some on NIDS. According to [11], HIDS is much related to antivirus program. currently researchers and scientist are focusing on NIDS, because it is more proactive than HIDS.. By having Intrusion Detection, it does not allow the system to compromise with the anomalies and attacks on a network.…”
Section: Types Of Idsmentioning
confidence: 99%
“…The authors experimented with various deep learning frameworks (fast.ai, 3 Keras, 4 PyTorch, 5 TensorFlow, 6 Theano 7 ) to detect network intrusion traffic and classify attack types. For preprocessing, samples with "Infinity", "NaN", or missing values were dropped and timestamps converted to Unix epoch numeric values (number of seconds since January 1, 1970).…”
Section: Basnet Et Al [15] (Towards Detecting and Classifying Networmentioning
confidence: 99%