Identification method of attack path based on immune intrusion detection

被引:26
|
作者
Wenhua, Huang [1 ]
Geng, Yishuang [2 ]
机构
[1] School of Telecommunications and Information Engineering, Xi'an University of Posts and Telecommunications, Xi'an, China
[2] Center of Wireless Information Network Studies (CWINS), Worcester Polytechnic Institute, Worcester, MA, 01609, United States
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
10.4304/jnw.9.4.964-971
中图分类号
学科分类号
摘要
Computer crime - Internet protocols - Feature extraction
引用
收藏
页码:964 / 971
相关论文
共 50 条
  • [31] A Neural Network Based System for Intrusion Detection and Attack Classification
    Subba, Basant
    Biswas, Santosh
    Karmakar, Sushanta
    2016 TWENTY SECOND NATIONAL CONFERENCE ON COMMUNICATION (NCC), 2016,
  • [32] Alert verification based on attack classification in collaborative intrusion detection
    Xiao, Min
    Xiao, Debao
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 2, PROCEEDINGS, 2007, : 739 - +
  • [33] Scenario recognition based on collaborative attack modeling in intrusion detection
    Liu, Xuejiao
    Xiao, Debao
    Gu, Ting
    Xu, Hui
    IMECS 2008: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2008, : 378 - 382
  • [34] Adaptive Semi-Supervised Algorithm for Intrusion Detection and Unknown Attack Identification
    Li, Meng
    Luo, Lei
    Xiao, Kun
    Wang, Geng
    Wang, Yintao
    APPLIED SCIENCES-BASEL, 2025, 15 (04):
  • [35] Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System
    Mohammed, Fadwa Abdul-Bari Ahmed
    Mekky, Nagham E.
    Soliman, Hassan
    Hikal, Noha A.
    IEEE ACCESS, 2024, 12 : 86985 - 86996
  • [36] An Intelligent Intrusion Detection System for Internet of Things Attack Detection and Identification Using Machine Learning
    Othman, Trifa S.
    Abdullah, Saman M.
    ARO-THE SCIENTIFIC JOURNAL OF KOYA UNIVERSITY, 2023, 11 (01): : 126 - 137
  • [37] Network Intrusion Detection System based on Generative Adversarial Network for Attack Detection
    Das, Abhijit
    Balakrishnan, S. G.
    Pramod
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (11) : 757 - 766
  • [38] Employing Attack Graphs for Intrusion Detection
    Capobianco, Frank
    George, Rahul
    Huang, Kaiming
    Jaeger, Trent
    Krishnamurthy, Srikanth
    Qian, Zhiyun
    Payer, Mathias
    Yu, Paul
    NSPW'19: PROCEEDINGS OF THE NEW SECURITY PARADIGMS WORKSHOP, 2019, : 16 - 30
  • [39] Immune algorithms based on data processing in intrusion detection
    Zhang, Yufang
    Xiong, Zhongyang
    Chen, Yan
    Li, Guangyong
    Geng, Xiaofei
    Journal of Computational Information Systems, 2008, 4 (01): : 293 - 300
  • [40] Research on Intrusion Detection Technology Based on Immune Algorithm
    Zhu, Kai
    Meng, Xiangru
    Ma, Zhiqiang
    KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 759 - 762