2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distribu 2017
DOI: 10.1109/snpd.2017.8022786
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection using clustering of network traffic flows

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are easily targeted by attackers. These types of attackers are harm network as well as host machine [1]. From past decade intrusion attacks are increased, so recover from this problem there are different approaches like firewall security, encryption, control access, VPN(virtual private network) [2,3], and IDS/IPS are used.…”
Section: Introductionmentioning
confidence: 99%
“…In the era of digitization of data, security of the Network is the main objective because network services are enormously increasing day by day and they are easily targeted by attackers. These types of attackers are harm network as well as host machine [1]. From past decade intrusion attacks are increased, so recover from this problem there are different approaches like firewall security, encryption, control access, VPN(virtual private network) [2,3], and IDS/IPS are used.…”
Section: Introductionmentioning
confidence: 99%