A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
Collaborative intrusion detection network (CIDN) offers the ability to correlate suspicious activities from various collaborative intrusion detection systems (CIDSs) in different networks to maximize the efficiency of the intrusion detection by sharing the knowledge and resources among them which f...
| Main Author: | Bakhdlaghi, Yousef Abdullah |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/90709/ http://psasir.upm.edu.my/id/eprint/90709/1/FSKTM%202020%2015%20IR.pdf |
Similar Items
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016)
by: Tabaan, Alaa Abdulrahman
Published: (2016)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Sensing Danger: Innate Immunology for Intrusion Detection
by: Aickelin, Uwe, et al.
Published: (2007)
by: Aickelin, Uwe, et al.
Published: (2007)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Immune System Approaches to Intrusion Detection - A Review
by: Kim, Jungwon, et al.
Published: (2007)
by: Kim, Jungwon, et al.
Published: (2007)
Adaptive alert throttling for intrusion detection systems
by: Tedesco, Gianni, et al.
Published: (2003)
by: Tedesco, Gianni, et al.
Published: (2003)
Siren songs: a novel sonification method for network
traffic and intrusion detection
by: Skarth-Hayley, Luke
Published: (2017)
by: Skarth-Hayley, Luke
Published: (2017)
Intrusion notification via SMS / Aziz Kasmir Mat Yunos
by: Mat Yunos, Aziz Kasmir
Published: (2006)
by: Mat Yunos, Aziz Kasmir
Published: (2006)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
Data Reduction in Intrusion Alert Correlation
by: Tedesco, Gianni, et al.
Published: (2006)
by: Tedesco, Gianni, et al.
Published: (2006)
Development of a Saltwater Intrusion Software Using Visual Basic
by: Tan, Chiau Siang
Published: (2001)
by: Tan, Chiau Siang
Published: (2001)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
by: Kweh, Yeah Lun
Published: (2011)
by: Kweh, Yeah Lun
Published: (2011)
Smart Camp: Building Scalable and Highly Available IT-Infrastructures
by: Proskurin, S., et al.
Published: (2012)
by: Proskurin, S., et al.
Published: (2012)
Investigating Supervised Neural Networks to Intrusion Detection
by: Iftikhar , Ahmad, et al.
Published: (2010)
by: Iftikhar , Ahmad, et al.
Published: (2010)
Intrusion detection and prevention in wireless sensor networks
by: Abduvaliyev, Abror, et al.
Published: (2013)
by: Abduvaliyev, Abror, et al.
Published: (2013)
An architectural design for a hybrid intrusion detection system for database
by: Haratian, Mohammad Hossein
Published: (2009)
by: Haratian, Mohammad Hossein
Published: (2009)
comparative Analysis of Intrusion Detection Approaches
by: I., Ahmad, et al.
Published: (2010)
by: I., Ahmad, et al.
Published: (2010)
The state of the art in intrusion prevention and detection
Published: (2014)
Published: (2014)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
A survey on MANET intrusion detection
by: Mandala, Satria, et al.
Published: (2008)
by: Mandala, Satria, et al.
Published: (2008)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A computational workflow for urban micro-simulation of buildings' energy performance
by: Zakhary, Sameh, et al.
Published: (2016)
by: Zakhary, Sameh, et al.
Published: (2016)
INTRUSIVE MARKETING METHODS A CONTEMPORARY CONSUMER PERSPECTIVE
by: Owais, Faizan
Published: (2008)
by: Owais, Faizan
Published: (2008)
Scalable machine learning-based intrusion detection system for IoT-enabled smart cities
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
An Immunology-inspired Multi-engine Anomaly Detection System with Hybrid Particle Swarm Optimisations
by: Jiang, F., et al.
Published: (2012)
by: Jiang, F., et al.
Published: (2012)
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017)
by: Shahid, Anwar, et al.
Published: (2017)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Review on Intrusion Detection System Based on The Goal of The Detection System
by: Khaleel, M. K., et al.
Published: (2018)
by: Khaleel, M. K., et al.
Published: (2018)
Intrusion Detection Systems, Issues, Challenges, and Needs
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
Similar Items
-
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016) -
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020) -
Features selection for intrusion detection system using hybridize PSO-SVM
by: Tabaan, Alaa Abdulrahman
Published: (2016) -
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022) -
Rule Generalisation in Intrusion Detection Systems using Snort
by: Aickelin, Uwe, et al.
Published: (2007)