Analysis of IDS and IIDPS
Abstract
KEYWORDS: Intelligence Intrusion Multi Detection Prevention System, IIMDPS, Unknown Malware, Intelligence Intrusion Multi Detection Prevention Systems, Intelligence Intrusion Detection Prevention System, IIDPS.
Full Text:
PDFReferences
Chebrolu S, Abraham A, Thomas JP, “Feature detection and ensemble design of intrusion detection systems”, Compute Security; 24:, 2005, pp.295–307.
Chen Y, Abraham A, Yang J , “Feature deduction and intrusion detection using flexible neural trees”, In Second IEEE International Symposium on Neural Networks , 2005.
Chou T-S, Yen KK, “Fuzzy belief k-nearest neighbors anomaly detection of user to root and remote to local attacks”, The 2007 IEEE workshop on information assurance, United States MilitaryAcademy, West Point, NY, pp 207–213.
Cohen F, ”Computer viruses: theory and experiments”, Computer Security 6(1):22–35,1987.
Ghosh AK, Schwartzbard A, Schatz M , “Learning program behavior profiles for intrusion detection”, Workshop on intrusion detection and network monitoring, Santa Clara, CA, USENIX,1999.
Livadas C, Walsh B, Lapsley D, Strayer T , “Using machine learning techniques to identify botnet traffic”, Second IEEE LCN workshop on network security (WNS), Tampa, FL, USA,2006.
DOI: https://doi.org/10.37628/ijacs.v1i2.116
Refbacks
- There are currently no refbacks.