Network Systems Intrusion: Concept, Detection, Decision, and Prevention

被引:0
|
作者
Pleskonjic, Dragan [1 ]
Omerovic, Sanida [2 ]
Tomazic, Saso [2 ]
机构
[1] Finsoft Ltd, London, England
[2] Univ Ljubljana, Fac Elect Engn, Ljubljana, Slovenia
来源
关键词
agent; artificial intelligence; concept; decision making; detection; intrusion; prevention; sensor; server; system; wireless network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes concepts for intrusion detection processes; building decision making (DM) criteria on the bases of intrusion detection, and prevention based on DM as a last level of protection in computer systems and networks. The second part of the paper discusses a practical implementation for Intrusion Detection and Prevention Systems (IDPS), based on Wireless technology (WIDPS). Basically paper concentrates on the problems/answers of how to differentiate between legal and illegal access, i.e. intrusion and what are the key and root causes of this difference. Two issues are differenced: finding the set of concepts needed for detection and a set of criteria for DM in IDPS. Paper concludes with achieved results and future goals related to automated DM process in wireless technology.
引用
收藏
页码:40 / 49
页数:10
相关论文
共 50 条
  • [41] Adversarial examples for network intrusion detection systems
    Sheatsley, Ryan
    Papernot, Nicolas
    Weisman, Michael J.
    Verma, Gunjan
    McDaniel, Patrick
    JOURNAL OF COMPUTER SECURITY, 2022, 30 (05) : 727 - 752
  • [42] A benchmark evaluation of network intrusion detection systems
    Champion, T
    Denz, ML
    2001 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-7, 2001, : 2705 - 2712
  • [43] Data fusion and network intrusion detection systems
    Ahmad, Rasheed
    Alsmadi, Izzat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (06): : 7493 - 7519
  • [44] A Survey on Network Attacks and Intrusion Detection Systems
    Latha, S.
    Prakash, Sinthu Janita
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [45] Evidential reasoning in network intrusion detection systems
    Esmaili, M
    Safavi-Naini, R
    Pieprzyk, J
    INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 253 - 265
  • [46] Developing a Siamese Network for Intrusion Detection Systems
    Hindy, Hanan
    Tachtatzis, Christos
    Atkinson, Robert
    Bayne, Ethan
    Bellekens, Xavier
    PROCEEDINGS OF THE 1ST WORKSHOP ON MACHINE LEARNING AND SYSTEMS (EUROMLSYS'21), 2021, : 120 - 126
  • [47] Priorities in the deployment of network intrusion detection systems
    Dobrucki, M
    Virtanen, T
    SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 405 - 408
  • [48] PAYLOAD MODELING FOR NETWORK INTRUSION DETECTION SYSTEMS
    Nwanze, Nnamdi
    Kim, Sun-il
    Summerville, Douglas H.
    MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 1357 - +
  • [49] A Competitive Neural Network for Intrusion Detection Systems
    Palomo, Esteban Jose
    Dominguez, Enrique
    Luque, Rafael Marcos
    Munoz, Jose
    MODELLING, COMPUTATION AND OPTIMIZATION IN INFORMATION SYSTEMS AND MANAGEMENT SCIENCES, PROCEEDINGS, 2008, 14 : 530 - 537
  • [50] Anonymized Network Monitoring for Intrusion Detection Systems
    Srinivas, D. B.
    Mohan, Sagar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (07): : 191 - 198