An Embedded Intrusion Detection System Model for Application Program

被引:0
|
作者
Wu, Shaofei [1 ]
Chen, Yan [2 ]
机构
[1] WuHan Inst Technol, Sch Engn & Comp Sci, Wuhan 430073, HuBei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection is an effective security mechanism developed in the recent decade. Because of its wide applicability, intrusion detection becomes the key part of the security mechanism. The modern technologies and models in intrusion detection field are categorized and studied. The characters of current practical IDS are introduced. The theories and realization of IDS based on applications are presented. The basic ideas concerned with how to design and realize the embedded IDS for application are proposed.
引用
收藏
页码:1861 / +
页数:2
相关论文
共 50 条
  • [1] A generic model for an application based intrusion prevention detection system
    Anand, S
    Ramachandran, V
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (04): : 233 - 240
  • [2] Platform based on an embedded system to evaluate the intrusion detection system
    Saber, Mohammed
    Emharref, Mohamed
    Bouchentouf, Toumi
    Benazzi, Abdelhamid
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 894 - 899
  • [3] IN-BUILT INTRUSION DETECTION SYSTEM FOR EMBEDDED PROCESSORS
    Rahimunnisa, K.
    Varkey, Rincy Merrin
    Sureshkumar, S.
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 524 - +
  • [4] Network Intrusion Detection System Embedded on a Smart Sensor
    Macia-Perez, Francisco
    Mora-Gimeno, Francisco J.
    Marcos-Jorquera, Diego
    Antonio Gil-Martinez-Abarca, Juan
    Ramos-Morillo, Hector
    Lorenzo-Fonseca, Iren
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2011, 58 (03) : 722 - 732
  • [5] Application of Cloud Model in Intrusion Detection
    Wang, Deguang
    Zhou, Zhigang
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 164 - 167
  • [7] Novel immune system model and its application to network intrusion detection
    Ling, Jun
    Cao, Yang
    Yin, Jian-Hua
    Huang, Tian-Xi
    Wuhan University Journal of Natural Sciences, 2003, 8 (2 A) : 393 - 398
  • [8] MODEL OF DISTRIBUTED INTRUSION DETECTION SYSTEM
    Trifonov, Vencisalv
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2010, 2 (02): : 67 - 72
  • [9] A Distributed Intrusion Detection System Model
    Wu, Shaofei
    Xiao, Shuchao
    PROCEEDINGS OF 2008 INTERNATIONAL PRE-OLYMPIC CONGRESS ON COMPUTER SCIENCE, VOL I: COMPUTER SCIENCE AND ENGINEERING, 2008, : 331 - 334
  • [10] Network Intrusion Detection Framework Based on Embedded Tree Model
    Zhou, Jieying
    He, Pengfei
    Qiu, Rongfa
    Wu, Weigang
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2019, PT II, 2020, 11945 : 410 - 417