Protocol-based classification for intrusion detection

被引:0
|
作者
Yu, Kun-Ming [1 ]
Wu, Ming-Feng [2 ]
Wong, W.-T. [2 ]
机构
[1] Department of Computer Science and Information Engineering, Chung Hua University, No. 707, Sec. 2, WuFu Road, HsinChu, Taiwan
[2] Department of Information Management, Chung Hua University, No. 707, Sec. 2, WuFu Road, HsinChu, Taiwan
来源
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 141
相关论文
共 50 条
  • [21] Intrusion detection method based on imbalanced learning classification
    Li, Xiangjun
    Kong, Ke
    Shen, Hua
    Wei, Zhixiang
    Liao, Xiaofeng
    JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE, 2024, 36 (05) : 657 - 677
  • [22] Intrusion Detection Based on Genetic Fuzzy Classification System
    Belhor, Mariem
    Jemili, Farah
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [23] Intrusion Traffic Detection and Classification Based on Unsupervised Learning
    Zhong, Zhaogen
    Xie, Cunxiang
    Tang, Xibo
    IEEE ACCESS, 2024, 12 : 67860 - 67879
  • [24] Protocol Intrusion Detection Architecture
    Vokorokos, Liberios
    Balaz, Anton
    Trelova, Jana
    Sestina, Ivan
    Turinska, Alexandra
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 246 - 250
  • [25] Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets
    Zeeshan, Muhammad
    Riaz, Qaiser
    Bilal, Muhammad Ahmad
    Shahzad, Muhammad K.
    Jabeen, Hajira
    Haider, Syed Ali
    Rahim, Azizur
    IEEE ACCESS, 2022, 10 : 2269 - 2283
  • [26] Research on Distributed Intrusion Detection System Based on Protocol Analysis
    Qu, Xiaohong
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 421 - 424
  • [27] The Research of Distributed Intrusion Detection and Communication Protocol Based on Entity
    Tong, Xiaojun
    Cu, Minggen
    Ma, Chao
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4615 - 4618
  • [28] A peer-based hardware protocol for intrusion detection systems
    White, GB
    Huson, ML
    MILCOM 96, CONFERENCE PROCEEDINGS, VOLS 1-3, 1996, : 468 - 472
  • [29] A proposal of protocol and policy-based intrusion detection system
    Baba, T
    Matsuda, S
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL, III, PROCEEDINGS: COMMUNICATION, NETWORK AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2003, : 365 - 370
  • [30] Stochastic protocol modeling for anomaly based network intrusion detection
    Estevez-Tapiador, JM
    Garcia-Teodoro, P
    Diaz-Verdejo, JE
    IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 3 - 12