Zheng et al., 2001 - Google Patents
A network state based intrusion detection modelZheng et al., 2001
- Document ID
- 12019886781557774076
- Author
- Zheng S
- Peng C
- Ying X
- Ke X
- Publication year
- Publication venue
- Proceedings 2001 International Conference on Computer Networks and Mobile Computing
External Links
Snippet
This paper presents a new approach, called the network state based model, to describe intrusions and attacks. In the model which uses FA theory and can detect unknown attacks, the attacks and intrusions are described by the states and state transitions of network …
- 238000001514 detection method 0 title abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ur Rehman et al. | DIDDOS: An approach for detection and identification of Distributed Denial of Service (DDoS) cyberattacks using Gated Recurrent Units (GRU) | |
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Bhuyan et al. | Network traffic anomaly detection and prevention: concepts, techniques, and tools | |
| Ning et al. | Analyzing intensive intrusion alerts via correlation | |
| EP1995929B1 (en) | Distributed system for the detection of eThreats | |
| Mahoney | A machine learning approach to detecting attacks by identifying anomalies in network traffic | |
| Mukkamala et al. | Cyber security challenges: Designing efficient intrusion detection systems and antivirus tools | |
| Norouzian et al. | Classifying attacks in a network intrusion detection system based on artificial neural networks | |
| Zohourian et al. | IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks | |
| Kumar et al. | Intrusion detection systems: a review | |
| Thomas | Improving intrusion detection for imbalanced network traffic | |
| Zheng et al. | A network state based intrusion detection model | |
| Labib | Computer security and intrusion detection | |
| Hwa et al. | Review of peer-to-peer botnets and detection mechanisms | |
| Lampesberger et al. | An on-line learning statistical model to detect malicious web requests | |
| Bolzoni | Revisiting anomaly-based network intrusion detection systems | |
| Caulkins et al. | A dynamic data mining technique for intrusion detection systems | |
| Ezeife et al. | SensorWebIDS: a web mining intrusion detection system | |
| Naik et al. | Building a cognizant honeypot for detecting active fingerprinting attacks using dynamic fuzzy rule interpolation | |
| Jadidoleslamy | Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems | |
| Wu et al. | A novel approach to trojan horse detection by process tracing | |
| Berthier et al. | An evaluation of connection characteristics for separating network attacks | |
| Marinova-Boncheva | Applying a data mining method for intrusion detection | |
| Drakos | Implement a security policy and identify Advance persistent threats (APT) with ZEEK anomaly detection mechanism | |
| Avkurova et al. | Structural and analytical models for early apt-attacks detection in critical infrastructure |