2010 IEEE 34th Annual Computer Software and Applications Conference Workshops 2010
DOI: 10.1109/compsacw.2010.57
|View full text |Cite
|
Sign up to set email alerts
|

XIDR: A Dynamic Framework Utilizing Cross-Layer Intrusion Detection for Effective Response Deployment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…A false positive occurs when an IDS identifies a well-behaved node as an intruder; the literature also refers to this as a false alarm; specificity is the complement of false positive rate (1 − F P R). A false negative occurs when an IDS identifies a malicious or selfish node as wellbehaved; the literature also refers to this as a failure to report [22,23,24]. On the other hand, a detection (a true positive) occurs when an IDS correctly identifies a malicious or selfish node [12,18,19,20,21,25,26]; true positive rate is synonymous with sensitivity and recall.…”
Section: Intrusion Detection Performance Metricsmentioning
confidence: 99%
See 4 more Smart Citations
“…A false positive occurs when an IDS identifies a well-behaved node as an intruder; the literature also refers to this as a false alarm; specificity is the complement of false positive rate (1 − F P R). A false negative occurs when an IDS identifies a malicious or selfish node as wellbehaved; the literature also refers to this as a failure to report [22,23,24]. On the other hand, a detection (a true positive) occurs when an IDS correctly identifies a malicious or selfish node [12,18,19,20,21,25,26]; true positive rate is synonymous with sensitivity and recall.…”
Section: Intrusion Detection Performance Metricsmentioning
confidence: 99%
“…Svecs et al [22] present an IDS called Cross-layer Intrusion Detection and Response (XIDR). XIDR combines both detection techniques (anomaly and signature based) and collection approaches (behavior and traffic based) and use both local and global intrusion responses.…”
Section: Combined Designsmentioning
confidence: 99%
See 3 more Smart Citations