[go: up one dir, main page]

Zheng et al., 2001 - Google Patents

A network state based intrusion detection model

Zheng et al., 2001

Document ID
12019886781557774076
Author
Zheng S
Peng C
Ying X
Ke X
Publication year
Publication venue
Proceedings 2001 International Conference on Computer Networks and Mobile Computing

External Links

Snippet

This paper presents a new approach, called the network state based model, to describe intrusions and attacks. In the model which uses FA theory and can detect unknown attacks, the attacks and intrusions are described by the states and state transitions of network …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Ur Rehman et al. DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU)
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Bhuyan et al. Network traffic anomaly detection and prevention: concepts, techniques, and tools
Ning et al. Analyzing intensive intrusion alerts via correlation
EP1995929B1 (en) Distributed system for the detection of eThreats
Mahoney A machine learning approach to detecting attacks by identifying anomalies in network traffic
Mukkamala et al. Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools
Norouzian et al. Classifying attacks in a network intrusion detection system based on artificial neural networks
Zohourian et al. IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks
Kumar et al. Intrusion detection systems: a review
Thomas Improving intrusion detection for imbalanced network traffic
Zheng et al. A network state based intrusion detection model
Labib Computer security and intrusion detection
Hwa et al. Review of peer-to-peer botnets and detection mechanisms
Lampesberger et al. An on-line learning statistical model to detect malicious web requests
Bolzoni Revisiting anomaly-based network intrusion detection systems
Caulkins et al. A dynamic data mining technique for intrusion detection systems
Ezeife et al. SensorWebIDS: a web mining intrusion detection system
Naik et al. Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation
Jadidoleslamy Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Wu et al. A novel approach to trojan horse detection by process tracing
Berthier et al. An evaluation of connection characteristics for separating network attacks
Marinova-Boncheva Applying a data mining method for intrusion detection
Drakos Implement a security policy and identify Advance persistent threats (APT) with ZEEK anomaly detection mechanism
Avkurova et al. Structural and analytical models for early apt-attacks detection in critical infrastructure