Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 18
Page No. 3605 - 3610

Comparative Study of Multiple Intrusion Detection Systems

Authors : S. Saravanan and M. Ramakrishnan

References

Eskin, E., A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, 2002. A Geometric Framework for Unsupervised Anomaly Detection. In: Applications of Data Mining in Computer Security. Daniel, B. and S. Jajodia (Eds.). Springer US, Berlin, Germany, ISBN: 978-1-4613-5321-8, pp: 77-101.

Gaikwad, D.P., S. Jagtap, K. Thakare and V. Budhawant, 2012. Anomaly based intrusion detection system using artificial neural network and fuzzy clustering. Int. J. Eng. Res. Technol., Vol. 1,

Gu, G., P. Porras, V. Yegneswaran, M. Fong and W. Lee, 2007. BotHunter: Detecting malware infection through IDS-driven dialog correlation. Proceedings of the 16th USENIX Security Symposium, August 6-10, 2007, Boston, MA., USA -.

Gu, L., D. Zeng, P. Li and S. Guo, 2014. Cost minimization for big data processing in geo-distributed data centers. IEEE. Trans. Emerg. Topics Comput., 2: 314-323.
CrossRef  |  Direct Link  |  

Jaiganesh, V., P. Sumathi and S. Mangayarkarasi, 2013. An analysis of intrusion detection system using back propagation neural network. Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), February 21-22, 2013, IEEE, Chennai, India, ISBN: 978-1-4673-5786-9, pp: 232-236.

Kartit, A., A. Saidi, F. Bezzazi, E.M. Marraki and A. Radi, 2012. A new approach to intrusion detection system. J. Theor. Appl. Inf. Technol., 36: 284-290.

Puttini, R.S., J.M. Percher, L. Me, O. Camp and D.J.R. Sousa et al., 2003. A Modular Architecture for Distributed IDS in MANET. In: Computational Science and its Applications. Vipin, K., L.G. Marina, C.J.T. Kenneth and P.L. Ecuyer (Eds.). Springer Berlin Heidelberg, Berlin, Germany, ISBN: 978-3-540-40156-8, pp: 91-113.

Rafsanjani, M.K., A. Movaghar and F. Koroupi, 2008. Investigating intrusion detection systems in MANET and comparing IDSs for detecting misbehaving nodes. World Acad. Sci. Eng. Technol., 20: 351-355.
Direct Link  |  

Rocke, A.J. and R.F. DeMara, 2006. CONFIDANT: Collaborative object notification framework for insider defense using autonomous network transactions. Auton. Agents Multi Agent Syst., 12: 93-114.
CrossRef  |  Direct Link  |  

Spafford, E., 2008. James P. Anderson: An information security pioneer. IEEE. Secur. Privacy, 6: 9-9.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved