Academic literature on the topic 'Signature-based intrusion detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Signature-based intrusion detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Signature-based intrusion detection"
V. Stetsenko, Inna, and Maksym Demydenko. "Signature-based Intrusion Detection Hardware-Software Complex." Information & Security: An International Journal 47, no. 2 (2020): 221–31. http://dx.doi.org/10.11610/isij.4715.
Full textPanagiotou, Panos, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. "Host-based Intrusion Detection Using Signature-based and AI-driven Anomaly Detection Methods." Information & Security: An International Journal 50 (2021): 37–48. http://dx.doi.org/10.11610/isij.5016.
Full textEiny, Sajad, Cemil Oz, and Yahya Dorostkar Navaei. "The Anomaly- and Signature-Based IDS for Network Security Using Hybrid Inference Systems." Mathematical Problems in Engineering 2021 (March 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/6639714.
Full textKaur, Harpreet. "NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 2, no. 3 (June 30, 2012): 21–23. http://dx.doi.org/10.24297/ijct.v2i3a.2669.
Full textKala, T. Sree, and A. Christy. "Signature Based Algorithms and Intrusion Detection Systems." International Journal of Web Technology 5, no. 1 (June 13, 2016): 9–12. http://dx.doi.org/10.20894/ijwt.104.005.001.003.
Full textAnand, Saloni, and Kshitij Patne. "Network Intrusion Detection and Prevention." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 3754–59. http://dx.doi.org/10.22214/ijraset.2022.44761.
Full textSharma, Gaurav, and Anil Kumar Kapil. "INTRUSION DETECTION AND PREVENTION FRAMEWORK USING DATA MINING TECHNIQUES FOR FINANCIAL SECTOR." Acta Informatica Malaysia 5, no. 2 (September 29, 2021): 58–61. http://dx.doi.org/10.26480/aim.02.2021.58.61.
Full textKwon, Hee-Yong, Taesic Kim, and Mun-Kyu Lee. "Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods." Electronics 11, no. 6 (March 9, 2022): 867. http://dx.doi.org/10.3390/electronics11060867.
Full textRoka, Sanjay, and Santosh Naik. "SURVEY ON SIGNATURE BASED INTRUCTION DETECTION SYSTEM USING MULTITHREADING." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 58–62. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3352.
Full textAntunes, Mário, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado, and Tiago Murteira. "Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection." Informatics 9, no. 1 (March 20, 2022): 29. http://dx.doi.org/10.3390/informatics9010029.
Full textDissertations / Theses on the topic "Signature-based intrusion detection"
Cheung, Chun-Hom. "A learning-based approach to false alarm reduction for signature-based intrusion detection systems /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20CHEUNG.
Full textIncludes bibliographical references (leaves 100-106). Also available in electronic version. Access restricted to campus users.
Shafi, Kamran Information Technology & Electrical Engineering Australian Defence Force Academy UNSW. "An online and adaptive signature-based approach for intrusion detection using learning classifier systems." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/38991.
Full textPanichprecha, Sorot. "Abstracting and correlating heterogeneous events to detect complex scenarios." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26737/1/Sorot_Panichprecha_Thesis.pdf.
Full textPanichprecha, Sorot. "Abstracting and correlating heterogeneous events to detect complex scenarios." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26737/.
Full textTeixeira, Jorge Amílcar Lopes. "Network traffic sampling for improved signature and anomaly based intrusion detection." Master's thesis, 2008. http://hdl.handle.net/10216/58365.
Full textTeixeira, Jorge Amílcar Lopes. "Network traffic sampling for improved signature and anomaly based intrusion detection." Dissertação, 2008. http://hdl.handle.net/10216/58365.
Full textElsayed, Mohamed Ahmed Seifeldin Mohamed. "Blockchain-based containment of computer worms." Thesis, 2020. http://hdl.handle.net/1828/12492.
Full textGraduate
Subramanian, Ramanathan. "A Low-Complexity Algorithm For Intrusion Detection In A PIR-Based Wireless Sensor Network." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/1384.
Full textBooks on the topic "Signature-based intrusion detection"
Hilgurt, S. Ya, and O. A. Chemerys. Reconfigurable signature-based information security tools of computer systems. PH “Akademperiodyka”, 2022. http://dx.doi.org/10.15407/akademperiodyka.458.297.
Full textBook chapters on the topic "Signature-based intrusion detection"
Sy, Bon K. "Signature-Based Approach for Intrusion Detection." In Machine Learning and Data Mining in Pattern Recognition, 526–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11510888_52.
Full textShaikh, Asma, and Preeti Gupta. "Advanced Signature-Based Intrusion Detection System." In Intelligent Communication Technologies and Virtual Mobile Networks, 305–21. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1844-5_24.
Full textFan, Wenjun, Shubham Kumar, Sang-Yoon Chang, and Younghee Park. "A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection." In Silicon Valley Cybersecurity Conference, 57–73. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-24049-2_4.
Full textLi, Zhuowei, Amitabha Das, and Jianying Zhou. "USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection." In Advances in Knowledge Discovery and Data Mining, 702–12. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11430919_81.
Full textSangeetha, S., B. Gayathri devi, R. Ramya, M. K. Dharani, and P. Sathya. "Signature Based Semantic Intrusion Detection System on Cloud." In Advances in Intelligent Systems and Computing, 657–66. New Delhi: Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2250-7_66.
Full textKruegel, Christopher, and Thomas Toth. "Using Decision Trees to Improve Signature-Based Intrusion Detection." In Lecture Notes in Computer Science, 173–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45248-5_10.
Full textSerrano, José Manuel Bande, José Hernández Palancar, and René Cumplido. "High Throughput Signature Based Platform for Network Intrusion Detection." In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 544–51. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41827-3_68.
Full textYedukondalu, G., J. Anand Chandulal, and M. Srinivasa Rao. "Host-Based Intrusion Detection System Using File Signature Technique." In Innovations in Computer Science and Engineering, 225–32. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3818-1_25.
Full textIyer, J. Visweswara. "Intrusion Detection System Using Signature-Based Detection and Data Mining Technique." In Studies in Autonomic, Data-driven and Industrial Computing, 129–43. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5689-8_9.
Full textMehrotra, Latika, and Prashant Sahai Saxena. "An Assessment Report on: Statistics-Based and Signature-Based Intrusion Detection Techniques." In Information and Communication Technology, 321–27. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-5508-9_31.
Full textConference papers on the topic "Signature-based intrusion detection"
Kumar, Roshan, and Deepak Sharma. "Signature-Anomaly Based Intrusion Detection Algorithm." In 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018. http://dx.doi.org/10.1109/iceca.2018.8474781.
Full textMalek, Zakiyabanu S., Bhushan Trivedi, and Axita Shah. "User behavior Pattern -Signature based Intrusion Detection." In 2020 Fourth World Conference on Smart Trends in Systems Security and Sustainablity (WorldS4). IEEE, 2020. http://dx.doi.org/10.1109/worlds450073.2020.9210368.
Full textAldwairi, Monther, Mohammad A. Alshboul, and Asmaa Seyam. "Characterizing Realistic Signature-based Intrusion Detection Benchmarks." In the 6th International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3301551.3301591.
Full textLassez, Jean-Louis, Ryan Rossi, Stephen Sheel, and Srinivas Mukkamala. "Signature based intrusion detection using latent semantic analysis." In 2008 IEEE International Joint Conference on Neural Networks (IJCNN 2008 - Hong Kong). IEEE, 2008. http://dx.doi.org/10.1109/ijcnn.2008.4633931.
Full textTug, Steven, Weizhi Meng, and Yu Wang. "CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00217.
Full textYanfang Zhang, Fuxiang Gao, Yujie Guo, and Xu Liu. "Research on intrusion detection approach based on signature generation." In 2010 Second Pacific-Asia Conference on Circuits,Communications and System (PACCS). IEEE, 2010. http://dx.doi.org/10.1109/paccs.2010.5626672.
Full textTran, Ngoc Thinh, Shigenori Tomiyama, Surin Kittitornkun, and Tran Huy Vu. "TCP reassembly for signature-based Network Intrusion Detection systems." In 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2012). IEEE, 2012. http://dx.doi.org/10.1109/ecticon.2012.6254336.
Full textPayer, Garrett, Chris McCormick, and Richard Harang. "Applying hardware-based machine learning to signature-based network intrusion detection." In SPIE Sensing Technology + Applications, edited by Misty Blowers and Jonathan Williams. SPIE, 2014. http://dx.doi.org/10.1117/12.2052548.
Full textPayer, Garrett, Chris McCormick, and Richard Harang. "Applying hardware-based machine learning to signature-based network intrusion detection." In SPIE Defense + Security, edited by Igor V. Ternovskiy and Peter Chin. SPIE, 2014. http://dx.doi.org/10.1117/12.2049890.
Full textKazachkin, Dmitry, and Dennis Gamayunov. "Network Traffic Analysis Optimization at Signature-Based Intrusion Detection Systems." In Spring/Summer Young Researchers' Colloquium on Software Engineering. Institute for System Programming of the Russian Academy of Sciences, 2008. http://dx.doi.org/10.15514/syrcose-2008-2-5.
Full text