Kazienko et al., 2003 - Google Patents
Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)Kazienko et al., 2003
View PDF- Document ID
- 8358815489317382163
- Author
- Kazienko P
- Dorosz P
- Publication year
- Publication venue
- Retrieved April
External Links
Snippet
Due to a growing number of intrusions and since the Internet and local networks have become so ubiquitous, organizations increasingly implementing various systems that monitor IT security breaches. Intrusion Detection Systems (IDS) are those that have recently …
- 238000001514 detection method 0 title abstract description 42
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Levine et al. | The use of honeynets to detect exploited systems across large enterprise networks | |
US8640234B2 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
KR102501372B1 (en) | AI-based mysterious symptom intrusion detection and system | |
US20040193943A1 (en) | Multiparameter network fault detection system using probabilistic and aggregation analysis | |
Kazienko et al. | Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture) | |
KR et al. | Intrusion detection tools and techniques–a survey | |
Sayyed et al. | Intrusion detection system | |
Sulieman et al. | Detecting zero-day polymorphic worm: A review | |
Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
Pahal et al. | Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation | |
Kishore et al. | Intrusion detection system a need | |
Blackwell | Ramit-Rule-Based Alert Management Information Tool | |
Navin et al. | A survey on intrusion detection system | |
Singh et al. | A review on intrusion detection system | |
Harale et al. | Network based intrusion detection and prevention systems: Attack classification, methodologies and tools | |
Verwoerd | Active network security | |
Pasha | A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company | |
Patil et al. | Snort, BRO, NetSTAT, Emerald and SAX2: A Comparison. | |
Saini et al. | Extended Honeypot Framework to Detect old/new cyber attacks | |
Hooper | Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols | |
Sharma et al. | Analysis of IDS Tools & Techniques | |
Ambika et al. | Architecture for real time monitoring and modeling of network behavior for enhanced security | |
Nakato | Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent | |
Palekar et al. | Complete Study Of Intrusion Detection System | |
Bansah et al. | Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform |