2017 International Conference on the Frontiers and Advances in Data Science (FADS) 2017
DOI: 10.1109/fads.2017.8253208
|View full text |Cite
|
Sign up to set email alerts
|

Innovative signature based intrusion detection system: Parallel processing and minimized database

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Although this technique works reasonably well for recurrent attacks and can achieve better accuracy compared to anomaly-based detection systems, it will not be useful to detect new attacks since their signatures have not yet been identified. For example, [84] introduced a parallel processing technique for a small database with the most frequent signature and updating agent. To assist with a simultaneous search of both small databases, containing fewer signatures, and the complimentary database, whose size is larger since it stores old signatures, which are infrequently used; the authors introduced a multi-reading technique.…”
Section: No Areas Examplesmentioning
confidence: 99%
“…Although this technique works reasonably well for recurrent attacks and can achieve better accuracy compared to anomaly-based detection systems, it will not be useful to detect new attacks since their signatures have not yet been identified. For example, [84] introduced a parallel processing technique for a small database with the most frequent signature and updating agent. To assist with a simultaneous search of both small databases, containing fewer signatures, and the complimentary database, whose size is larger since it stores old signatures, which are infrequently used; the authors introduced a multi-reading technique.…”
Section: No Areas Examplesmentioning
confidence: 99%
“…They concluded that it supports application development for Contiki OS, but did not import the IDS modules to Contiki OS to test its performance in real world IOT environment. In another work Almutairi et al [3] introduced a solution in parallel processing environment with the help of most frequent features and an updating agent. They proved that this module can be used for both host and network based IDS.…”
Section: Literature Surveymentioning
confidence: 99%
“…Network anomaly detection has typically consists of comparative analysis of known threats against current activity on a network [5], [6]. However, while highly accurate and effective, it is possible for such mechanisms to fail in the case of a "Black Swan" or "Zero-Day" attack.…”
Section: Related Workmentioning
confidence: 99%