2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT) 2016
DOI: 10.1109/iccpct.2016.7530231
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection system: Classification and techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…SVM uses a hyper-plan for differentiating the response classes of the dataset. Genetic algorithm (GA) is an evolutionary algorithm-based approach in which optimization is based on mutation [52]. GA encodes a set of solutions to form a population, and GA evolute this population based on fitness function [65].…”
Section: E Comparison Of the Most Cited Approaches Used In Nidsmentioning
confidence: 99%
“…SVM uses a hyper-plan for differentiating the response classes of the dataset. Genetic algorithm (GA) is an evolutionary algorithm-based approach in which optimization is based on mutation [52]. GA encodes a set of solutions to form a population, and GA evolute this population based on fitness function [65].…”
Section: E Comparison Of the Most Cited Approaches Used In Nidsmentioning
confidence: 99%
“…The most obvious placement of an IDS is behind the firewall, allowing for monitoring of the entire network; however, this could create a bottleneck that may decrease the overall throughput of the network. On the other hand, if the IDS is placed deeper inside the network, the performance levels will be maintained, while a part of the network will be left vulnerable [ 44 , 45 ].…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…They can be classified into two main categories, which are presented below. 2,3,4 • Classification by the analysed activity -in other words, placement of an IDS. o Host IDS (HIDS) -a system that protects a single device system files by monitoring packets sent to and by the device whilst operating on a database of system objects.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%