Modified Apriori Approach for Evade Network Intrusion Detection System

@article{Lahoti2014ModifiedAA,
  title={Modified Apriori Approach for Evade Network Intrusion Detection System},
  author={Laxmi Lahoti and Chaitali Chandankhede and Debajyoti Mukhopadhyay},
  journal={2014 International Conference on Information Technology},
  year={2014},
  pages={374-378}
}
Intrusion Detection System (IDS) is a software or hardware tool that repeatedly scans and monitors events that took place in a computer or a network. A set of rules are used by Signature based Network Intrusion Detection Systems (NIDS) to detect hostile traffic in network segments or packets, which are so important in detecting malicious and anomalous behavior over the network like known attacks that hackers look for new techniques to go unseen. Sometime, a single failure at any layer will… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS

References

Publications referenced by this paper.
Showing 1-10 of 12 references

IEEE,” Evasion Techniques: Sneaking Through Your Intrusion Detection/Prevention Systems

  • T-sung-huan Cheng, Ying-dar Lin, IEEE, Yuan-cheng Lai, Po-ching Lin
  • IEEE Communications Surveys & Tutorials, Accepted…
  • 2011

A ByteFiltered String Matching Algorithm for Fast Deep Packet Inspection , ”

  • Po-Ching Lin, Kun Huang
  • The 9 th International Conference for Computer…
  • 2008

DafangZhang,"A Byte-Filtered String Matching Algorithm for Fast Deep Packet Inspection,”.The 9th International Conference for Computer science

  • Kun Huang
  • 2008
1 Excerpt

Lai; "Using String Matching for Deep Packet Inspection,

  • Po-Ching Lin, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng
  • 2008

NIST Special Publication on Intrusion Detection Systems

  • R. Bace, P. Mell
  • 800-31, 2001.
  • 2001
1 Excerpt

Network instrusion detection: Evasion, traffic normalization and end-to-end protocol semantics

  • M. Handley, C. Kreibich, V. Paxson
  • Proceedings of the 10th Conference on USENIX…
  • 2001
2 Excerpts

Similar Papers

Loading similar papers…