Satheesbabu et al., 2021 - Google Patents
The surveillance of intrusion detection systems and approachesSatheesbabu et al., 2021
View PDF- Document ID
- 8447179122189895078
- Author
- Satheesbabu S
- Gokulakrishnan P
- Dhanalakshmi N
- Publication year
- Publication venue
- INFORMATION TECHNOLOGY IN INDUSTRY
External Links
Snippet
With the widespread evolution of new technologies and services, Internet has experienced explosive growth across the market that actively increases the impact of attacks where the attackers continuously find vulnerabilities and attack the system In an information system …
- 238000001514 detection method 0 title abstract description 56
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stiawan et al. | Investigating brute force attack patterns in IoT network | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Bhuyan et al. | Surveying port scans and their detection methodologies | |
Pilli et al. | Network forensic frameworks: Survey and research challenges | |
Meng et al. | Towards effective trust-based packet filtering in collaborative network environments | |
Stevanovic et al. | Machine learning for identifying botnet network traffic | |
Kumar et al. | Intrusion detection systems: a review | |
Deka et al. | Network defense: Approaches, methods and techniques | |
Limmer et al. | Survey of event correlation techniques for attack detection in early warning systems | |
Zekrifa | Hybrid Intrusion Detection System | |
Matoušek et al. | Security monitoring of iot communication using flows | |
Satheesbabu et al. | The surveillance of intrusion detection systems and approaches | |
Iheagwara et al. | Evaluation of the performance of id systems in a switched and distributed environment: the realsecure case study | |
Prayote | Knowledge based anomaly detection | |
Abudalfa et al. | Evaluating performance of supervised learning techniques for developing real-time intrusion detection system | |
Ahmed et al. | MICIE: a model for identifying and collecting intrusion evidences | |
Thomas et al. | Performance enhancement of intrusion detection systems using advances in sensor fusion | |
Marinova-Boncheva | Applying a data mining method for intrusion detection | |
Stiawan et al. | Classification of habitual activities in behavior-based network detection | |
Beukema | Enhancing network intrusion detection through host clustering | |
Alharbi et al. | Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection | |
Verwoerd | Active network security | |
Gavrilovic et al. | Snort IDS system visualization interface | |
Sodagudi et al. | An approach to identify anomaly with network data analysis | |
Bostami et al. | Intrusion detection for big data |