2011
DOI: 10.7815/ijorcs.21.2011.012
|View full text |Cite
|
Sign up to set email alerts
|

Network Security using Linux Intrusion Detection System

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Attacks are discovered by keeping track of data from source and destination IP addresses, ports, protocol specifics, header specifics, etc. [9]. Attacks can be divided into two categories: passive and active, depending on their nature.…”
Section: Related Workmentioning
confidence: 99%
“…Attacks are discovered by keeping track of data from source and destination IP addresses, ports, protocol specifics, header specifics, etc. [9]. Attacks can be divided into two categories: passive and active, depending on their nature.…”
Section: Related Workmentioning
confidence: 99%
“…alerting the administrators to take necessary actions to prevent the destructive impacts of the attacks [4].…”
mentioning
confidence: 99%