Communications in Computer and Information Science
DOI: 10.1007/978-3-540-73986-9_29
|View full text |Cite
|
Sign up to set email alerts
|

Host-Based Intrusion Detection System: Model and Design Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…IDS come across the packets in a network and decide whether or not they're intruders or legitimate users. IDS usually consists of three components Monitoring, Analysis, and detection, Alarm [19]. There are mainly two kinds of IDS Host-based IDS and Network-based IDS.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…IDS come across the packets in a network and decide whether or not they're intruders or legitimate users. IDS usually consists of three components Monitoring, Analysis, and detection, Alarm [19]. There are mainly two kinds of IDS Host-based IDS and Network-based IDS.…”
Section: Intrusion Detection Systemmentioning
confidence: 99%
“…In [16], E. Anthi et al introduced a three-layer intrusion detection system (IDS) that used a supervised technique to detect a variety of prevalent network-based cyber-attacks on IoT networks. The system is made up of three major components.…”
Section: Related Workmentioning
confidence: 99%
“…A well know name of this system is hybrid system that combines both type of network features for detection intrusion in Network and Host type of attack [16]. This system is implemented over a vast distributed network, such as cloud computing, so that all varieties of platforms work easily with one another, such as a central server.…”
Section: Ids In a Distributed Architecturementioning
confidence: 99%
“…The advantage of the host-based IDS is that it provides more detailed information, lower false alarm rates, and has less complexity than network-based IDS. However, it reduces the efficiency of the application system and relies excessively on the log data and monitoring capability of the host [15].…”
Section: Classes Of Idsmentioning
confidence: 99%