On the detection capabilities of signature-based intrusion detection systems in the context of web attacks
Signature-based Intrusion Detection Systems (SIDS) play a crucial role within the arsenal of
security components of most organizations. They can find traces of known attacks in the …
security components of most organizations. They can find traces of known attacks in the …
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern …
Network security remains a critical concern in modern computing systems due to the
constant emergence of threats and attacks. This paper introduces a comprehensive …
constant emergence of threats and attacks. This paper introduces a comprehensive …
An ontology for SNORT rule
A Khurat, W Sawangphol - 2019 16th International Joint …, 2019 - ieeexplore.ieee.org
Intrusion Detection System (IDS) is an important component to provide security for an
organization. Its main function is to detect harmful traffic. The detection is done based on …
organization. Its main function is to detect harmful traffic. The detection is done based on …
A protocol-specific constraint-based intrusion detection system
MS Hasan - 2017 - search.proquest.com
With the advancement of new technologies, the frequency of malicious attacks is also
growing rapidly. Even networks without external connections cannot hide from these attacks …
growing rapidly. Even networks without external connections cannot hide from these attacks …
Using Partial Signatures in Intrusion Detection for Multipath TCP
Traditional security mechanisms such as signature based intrusion detection systems (IDSs)
attempt to find a perfect match of a set of signatures in network traffic. Such IDSs depend on …
attempt to find a perfect match of a set of signatures in network traffic. Such IDSs depend on …
A traffic tracking algorithm for a fast detection of active network sources
A Atiyah, S Almajali - Proceedings of the 2nd International Conference …, 2018 - dl.acm.org
Denial of Service attack is a cyber-attack that overwhelms the victim resources (system
resources and network bandwidth) and makes them unavailable to legitimate users. To take …
resources and network bandwidth) and makes them unavailable to legitimate users. To take …