+

Khanday et al., 2022 - Google Patents

Intrusion Detection Systems for Trending Cyberattacks

Khanday et al., 2022

Document ID
2248652093270849459
Author
Khanday S
Fatima H
Rakesh N
Publication year
Publication venue
Advancing Computational Intelligence Techniques for Security Systems Design

External Links

Snippet

In this age of communication, a great deal of effort has gone into filtering out known intrusions, malwares, exploits, and vulnerabilities within digital systems. As a result, intrusion detection is essential and a key component to ensure secure data communication and flow …
Continue reading at www.taylorfrancis.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting

Similar Documents

Publication Publication Date Title
Kizza System intrusion detection and prevention
Cazorla et al. Cyber stealth attacks in critical information infrastructures
US7890612B2 (en) Method and apparatus for regulating data flow between a communications device and a network
Sandhu et al. A survey of intrusion detection & prevention techniques
Abbas et al. Subject review: Intrusion detection system (IDS) and intrusion prevention system (IPS)
Altwairqi et al. Four most famous cyber attacks for financial gains
Mubeen et al. Strategies to Avoid Illegal Data Access
Innab et al. Hybrid system between anomaly based detection system and honeypot to detect zero day attack
CA2587867C (en) Network security device
Adeleke Intrusion detection: issues, problems and solutions
Aijaz et al. Security operations center—A need for an academic environment
Gao et al. Research on the main threat and prevention technology of computer network security
Beigh et al. Intrusion detection and prevention system: issues and challenges
Berchi et al. Security issues in cloud-based iot systems
Uyyala Multilevel authentication system using hierarchical intrusion detection architecture for online banking
Khanday et al. Intrusion Detection Systems for Trending Cyberattacks
Parekh et al. Approach for intrusion detection system using data mining
Kishore et al. Intrusion detection system a need
Vakil et al. Cyber Attacks: Detection and Prevention
Sandhu et al. A study of the novel approaches used in intrusion detection and prevention systems
Adavelli et al. AI and Cybersecurity: Advancements in Threat Detection and Prevention
McGee et al. How to counter cybercrime intrusions
Aloffi et al. Real time network security intrusions and risk management: a survey
Kaskar et al. A system for detection of distributed denial of service (DDoS) attacks using KDD cup data set
Kanika Security of network using Ids and firewall
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载