An Embedded Intrusion Detection System Model for Application Program

被引:0
|
作者
Wu, Shaofei [1 ]
Chen, Yan [2 ]
机构
[1] WuHan Inst Technol, Sch Engn & Comp Sci, Wuhan 430073, HuBei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection is an effective security mechanism developed in the recent decade. Because of its wide applicability, intrusion detection becomes the key part of the security mechanism. The modern technologies and models in intrusion detection field are categorized and studied. The characters of current practical IDS are introduced. The theories and realization of IDS based on applications are presented. The basic ideas concerned with how to design and realize the embedded IDS for application are proposed.
引用
收藏
页码:1861 / +
页数:2
相关论文
共 50 条
  • [21] The Research of a Cooperative Model Intrusion Detection System
    Zhu Qiang
    Shun Yuqiang
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 510 - 513
  • [22] An adaptive model of a distributed intrusion detection system
    Platonov V.V.
    Semenov P.O.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 894 - 898
  • [24] Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers
    Allison, David
    Mclaughlin, Kieran
    Smith, Paul
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (04):
  • [25] OASIS: An Intrusion Detection System Embedded in Bluetooth Low Energy Controllers
    Cayre, Romain
    Nicomette, Vincent
    Auriol, Guillaume
    Kaaniche, Mohamed
    Francillon, Aurelien
    PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 700 - 715
  • [26] Building an Application Data Behavior Model for Intrusion Detection
    Sarrouy, Olivier
    Totel, Eric
    Jouga, Bernard
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 299 - 306
  • [27] Application of rough set theory to intrusion detection system
    Wang, Xuren
    He, Famei
    Liu, Lizhen
    GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 562 - +
  • [28] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [29] A semantics based application level intrusion detection system
    Vaidehi, V.
    Srinivasan, N.
    Anand, P.
    Balaji, A. P.
    Prashanth, V.
    Sangeetha, S.
    2007 INTERNATIONAL CONFERENCE OF SIGNAL PROCESSING, COMMUNICATIONS AND NETWORKING, VOLS 1 AND 2, 2006, : 338 - +
  • [30] The Application of Data Mining Technology in the Intrusion Detection System
    Jia, Zongpu
    Jin, Shichao
    THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211