2016
DOI: 10.1002/dac.3225
|View full text |Cite
|
Sign up to set email alerts
|

Statistical fingerprint‐based intrusion detection system (SF‐IDS)

Abstract: Summary Intrusion detection systems (IDS) are systems aimed at analyzing and detecting security problems. The IDS may be structured into misuse and anomaly detection. The former are often signature/rule IDS that detect malicious software by inspecting the content of packets or files looking for a “signature” labeling malware. They are often very efficient, but their drawback stands in the weakness of the information to check (eg, the signature), which may be quickly dated, and in the computation time because e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…Rule-based detection system can be divided into rule-based [19], data mining [20], model-based/profile-based [21], and support vector machine (SVM) [22]. The system based on statistics is divided into statistics [23,24], distance-based [25], Bayesian [26], and game theory. State-based systems include state transition analysis [27], user intent recognition [28], Markov process model [29], and stateful protocol analysis (SPA) [30].…”
Section: Related Workmentioning
confidence: 99%
“…Rule-based detection system can be divided into rule-based [19], data mining [20], model-based/profile-based [21], and support vector machine (SVM) [22]. The system based on statistics is divided into statistics [23,24], distance-based [25], Bayesian [26], and game theory. State-based systems include state transition analysis [27], user intent recognition [28], Markov process model [29], and stateful protocol analysis (SPA) [30].…”
Section: Related Workmentioning
confidence: 99%
“…University of California Irvine (UCI) heart disease is a popular medical dataset [42]. Virus is a dataset developed by the University of Genova to deal with data traffic analysis [43][44][45]. Sonar represents the readings of a sonar system that analyses materials, distinguishing between rocks and metallic material [46,47].…”
Section: Experimental Analysis and Resultsmentioning
confidence: 99%
“…A feature set containing 14 components (indicated as features) will be used to classify each flow are listed in the Table below. This feature set is created by [77], it was used mainly to detect whether a flow is affected by a malware or not, it is selected since it represents an effective feature set and it encompass the main characteristics of a network traffic, and also the use of these features is coherent with the literature in the field.…”
Section: Dataset Creation: Generating Web Attacksmentioning
confidence: 99%