Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques
@inproceedings{Kalavadekar2019BuildingAE, title={Building an Effective Intrusion Detection System using combined Signature and Anomaly Detection Techniques}, author={P. Kalavadekar and S. Sane}, year={2019} }
Intrusion Detection Systems (IDS) are providing better solution to the current issues and thus became an important element of any security infrastructure to detect various threats so as to prevent widespread harm. The basic aim of IDS is to detect attacks and their nature and prevent damage to the computer systems. Several different approaches for intrusion detection have been reported in the literature. These approaches are broadly categorized into three approaches: I) Signature-based approach… CONTINUE READING
Figures and Tables from this paper
References
SHOWING 1-10 OF 40 REFERENCES
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- Computer Science
- Expert Syst. Appl.
- 2014
- 310
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2007
- 187
- PDF
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm
- Computer Science
- IEEE Transactions on Computers
- 2016
- 256
- PDF
Feature deduction and ensemble design of intrusion detection systems
- Computer Science
- Comput. Secur.
- 2005
- 600
- PDF
Decision tree based light weight intrusion detection using a wrapper approach
- Computer Science
- Expert Syst. Appl.
- 2012
- 244
- PDF
An Active Rule Approach for Network Intrusion Detection with Enhanced C4.5 Algorithm
- Computer Science
- Int. J. Commun. Netw. Syst. Sci.
- 2008
- 36
- PDF