2007
DOI: 10.1109/tdsc.2007.9
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
71
0
3

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 143 publications
(76 citation statements)
references
References 19 publications
2
71
0
3
Order By: Relevance
“…In the paper [12], a hybrid approach for adaptive network intrusion detection which involves a hybrid model combining HMM based model with Naive Bayesian (NB) based approach was proposed. But it holds some difficulties that might arise when implementing HMM model in real time.In the hybrid system [13] the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) was combined to detect novel unknown attacks. This technique leads to fast and accurate intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…In the paper [12], a hybrid approach for adaptive network intrusion detection which involves a hybrid model combining HMM based model with Naive Bayesian (NB) based approach was proposed. But it holds some difficulties that might arise when implementing HMM model in real time.In the hybrid system [13] the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) was combined to detect novel unknown attacks. This technique leads to fast and accurate intrusion detection.…”
Section: Related Workmentioning
confidence: 99%
“…The TCP congestion window is one example of such possibilities. Furthermore, we plan to simulate a dynamic game where both the attacker and the defender can alter their strategies during the attack event [16]. They also plan to contribute their NetHook module to the NS-3 codebases in order to make it available to other researchers interested in packet manipulation within the simulator.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Decision table is used to the particular response is associated with a particular attack. Rule-based is used to determine the appropriate response to intrusive behavior [7].…”
Section: Automatic Intrusion Responsementioning
confidence: 99%