Research of the dynamical rule generation for intrusion detection system

被引:0
|
作者
Liao, Niandong [1 ]
Tian, Shengfeng [1 ]
机构
[1] School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:116 / 120
相关论文
共 50 条
  • [21] Efficient Snort Rule Generation using Evolutionary computing for Network Intrusion Detection
    Muthuregunathan, Raghavan
    Siddharth, S.
    Srivathsan, R.
    Rajesh, S. R.
    2009 1ST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS(CICSYN 2009), 2009, : 336 - 341
  • [22] Automated Flow-based Rule Generation for Network Intrusion Detection Systems
    Fallahi, Naser
    Sami, Ashkan
    Tajbakhsh, Morteza
    2016 24TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2016, : 1948 - 1953
  • [23] Decision Tree Generation Method in Intrusion Detection System
    Du, Panpan
    PROCEEDINGS OF 2020 IEEE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS), 2020, : 265 - 268
  • [24] A Decentralized Intrusion Detection System for Security of Generation Control
    Roy, Siddhartha Deb
    Debbarma, Sanjoy
    Iqbal, Adnan
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (19) : 18924 - 18933
  • [25] Towards a new intelligent generation of intrusion detection system
    Benmoussa, Hajar
    Abou El Kalam, Anas
    Ait Ouahman, Abdellah
    PROCEEDINGS OF THE 4TH EDITION OF NATIONAL SECURITY DAYS (JNS4), 2014, : 5 - 9
  • [26] Dynamical analysis of diversity in rule-based open source network intrusion detection systems
    Hafizul Asad
    Ilir Gashi
    Empirical Software Engineering, 2022, 27
  • [27] Dynamical analysis of diversity in rule-based open source network intrusion detection systems
    Asad, Hafizul
    Gashi, Ilir
    EMPIRICAL SOFTWARE ENGINEERING, 2022, 27 (01)
  • [28] Intrusion Detection System Enhanced by Hierarchical Bidirectional Fuzzy Rule Interpolation
    Jin, Shangzhu
    Jiang, Yanling
    Peng, Jun
    2018 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2018, : 6 - 10
  • [29] Intrusion Detection System Based on Real Time Rule Accession and Honeypot
    Singh, Abhay Nath
    Kumar, Shiv
    Joshi, R. C.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 292 - 301
  • [30] Implementing Rule based Genetic Algorithm as a Solution for Intrusion Detection System
    Akbar, Shaik
    Rao, K. Nageswara
    Chandula, J. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 138 - 144