Packet pre-filtering for network intrusion detection

I Sourdis, V Dimopoulos, D Pnevmatikatos… - Proceedings of the …, 2006‏ - dl.acm.org
As Intrusion Detection Systems (IDS) utilize more complex syntax to efficiently describe
complex attacks, their processing requirements increase rapidly. Hardware and, even more …

On the symbiosis of specification-based and anomaly-based detection

N Stakhanova, S Basu, J Wong - computers & security, 2010‏ - Elsevier
As the number of attacks on computer systems increases and become more sophisticated,
there is an obvious need for intrusion detection systems to be able to effectively recognize …

n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems

M Aldwairi, D Alansari - Transactions on Emerging …, 2022‏ - Wiley Online Library
The advent of Internet of Energy (IoE) and the seamless integration of grid operators, power
generators, distributors, sensors, and end users promise more efficient use of energy …

[PDF][PDF] Performance characterization & improvement of snort as an IDS

S Sen - Bell Labs Report, 2006‏ - Citeseer
When working as an IDS, Snort may detect security attacks and alert the system
administrator or take the designated action like logging the malicious packets. If we …

[HTML][HTML] A distributed signature detection method for detecting intrusions in sensor systems

I Kim, D Oh, MK Yoon, K Yi, WW Ro - Sensors, 2013‏ - mdpi.com
Sensor nodes in wireless sensor networks are easily exposed to open and unprotected
regions. A security solution is strongly recommended to prevent networks against malicious …

[كتاب][B] Designs and algorithms for packet and content inspection.

I Sourdis - 2007‏ - cse.chalmers.se
This dissertation deals with essential issues pertaining to high perfor-mance processing for
network security and deep packet inspection. The proposed solutions keep pace with the …

Protomatching network traffic for high throughputnetwork intrusion detection

S Rubin, S Jha, BP Miller - Proceedings of the 13th ACM conference on …, 2006‏ - dl.acm.org
Before performing pattern matching, a typical misuse-NIDS performs protocol analysis: it
parses network traffic according to the attack protocol and normalizes the traffic into the form …

[PDF][PDF] An architecture of hybrid intrusion detection system

KK Patel, BV Buddhadev - International Journal of Information and …, 2013‏ - researchgate.net
Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect
attacks and malicious activities in information system. It is an essential element of any …

Classification and discovery of rule misconfigurations in intrusion detection and response devices

N Stakhanova, Y Li, AA Ghorbani - 2009 World Congress on …, 2009‏ - ieeexplore.ieee.org
The signature-based intrusion detection is one of the most commonly used techniques
implemented in modern intrusion detection systems (IDS). Being based on a set of rules, ie …