2021
DOI: 10.1155/2021/6639714
|View full text |Cite
|
Sign up to set email alerts
|

The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems

Abstract: With the expansion of communication in today’s world and the possibility of creating interactions between people through communication networks regardless of the distance dimension, the issue of creating security for the data and information exchanged has received much attention from researchers. Various methods have been proposed for this purpose; one of the most important methods is intrusion detection systems to quickly detect intrusions into the network and inform the manager or responsible people to carry… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 67 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…e associated database can provide the function of cluster analysis for data mining technology and can be deeply identified according to the characteristics of network security problems. For example, when malicious behavior attacks the computer terminal system, the associated database can comprehensively record and summarize its running track, execution program, and basic characteristics [20][21][22]. In the whole process, the cluster analysis algorithm plays a very important role.…”
Section: About the Use Of Databasementioning
confidence: 99%
“…e associated database can provide the function of cluster analysis for data mining technology and can be deeply identified according to the characteristics of network security problems. For example, when malicious behavior attacks the computer terminal system, the associated database can comprehensively record and summarize its running track, execution program, and basic characteristics [20][21][22]. In the whole process, the cluster analysis algorithm plays a very important role.…”
Section: About the Use Of Databasementioning
confidence: 99%
“…In 2018, the number of mine hijacking attacks was four times that of 2017. (2) In terms of mobile devices, the number of ransomware infections on mobile devices increased by 33% compared with 2017. e United States is the hardest hit area for mobile malware, accounting for 63% of the total, followed by China (13%) and Germany (10%). (3) In terms of web attacks, the total number of Web attacks on endpoints increased by 56% in 2018.…”
Section: Introductionmentioning
confidence: 99%
“…IDS systems become the most critical security systems for e-government and e-business applications [21]. One of the ways to identify hackers is to use and tightly tune intrusion detection systems (IDSs), which try to detect or predict the probability of an attack in various ways, such as controlling the network traffic and detecting those trying to attack by creating too much traffic on the network [22]. Session Initiation Protocol (SIP) packet replay attack, SIP packet insertion attack, TLS connection reset attack, flood attacks, and fake message attacks are the most known DoS attacks.…”
Section: Discussionmentioning
confidence: 99%