Structural Design of Intrusion Detection System

Article Preview

Abstract:

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

705-708

Citation:

Online since:

February 2014

Authors:

Export:

Price:

* - Corresponding Author

[1] A. Patel, M. Taghavi: Journal of Network and Computer Applications, Vol. 36 (2013), pp.25-41.

Google Scholar

[2] T. S. Sobh: Computer Standards & Interfaces, Vol. 28 (2006), pp.670-694.

Google Scholar

[3] J. J. Davis, A. J. Clark: Computers & Security, Vol. 30 (2011), pp.353-375.

Google Scholar

[4] S. Peddabachigari: Journal of Network and Computer Applications, Vol. 30 (2007), pp.114-132.

Google Scholar

[5] C. A. Catania, C. G. Garino: Computers & Electrical Engineering, Vol. 38 (2012), pp.1062-1072.

Google Scholar

[6] H. Artail, H. Safa, M. Sraj, I. Kuwatly: Computers & Security, Vol. 25 (2006), pp.274-288.

DOI: 10.1016/j.cose.2006.02.009

Google Scholar

[7] C. Kolias, G. Kambourakis, M. Maragoudakis: Computers & Security, Vol. 30 (2011), pp.625-642.

DOI: 10.1016/j.cose.2011.08.009

Google Scholar

[8] A. Jamdagni, Z. Tan, X. He, P. Nanda, R. P. Liu: Computer Networks, Vol. 57 (2013), pp.811-824.

Google Scholar

[9] W. Masri, R. A. Assi: Information and Software Technology, Vol. 56 (2014), pp.238-251.

Google Scholar

[10] M. N. Mohammed, N. Sulaiman: Procedia Technology, Vol. 1 (2012), pp.313-317.

Google Scholar

[11] S. McKinnon: Effective Physical Security (Fourth Edition), 2013, pp.191-212.

Google Scholar