共 50 条
- [11] Building agents for rule-based intrusion detection system [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1366 - 1373
- [12] A Novel Rule-based Intrusion Detection System Using Data Mining [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
- [13] Interactive visualization for network and port scan detection [J]. RECENT ADVANCES IN INTRUSION DETECTION, 2006, 3858 : 265 - 283
- [14] A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 769 - 775
- [15] Port Scanning Detection Based on Anomalies [J]. 2017 XI INTERNATIONAL IEEE SCIENTIFIC AND TECHNICAL CONFERENCE DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES (DYNAMICS), 2017,
- [16] Analysis of Intrusion Detection System Performance for the Port Scan Attack Detector, Portsentry, and Suricata [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATICS, ENGINEERING, SCIENCE, AND TECHNOLOGY (INCITEST 2019), 2019, 662
- [18] Building intrusion pattern miner for snort network intrusion detection system [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 477 - 484
- [19] Intrusion Detection Using Rule-Based Machine Learning Algorithms [J]. 2019 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2019,
- [20] An SSH Honeypot Architecture Using Port Knocking and Intrusion Detection System [J]. 2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 409 - 415