Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Balanced indexing method for efficient intrusion detection systems

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Boojoong-
dc.contributor.authorKim, Hye Seon-
dc.contributor.authorYang, Ji Su-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T12:53:56Z-
dc.date.available2022-07-16T12:53:56Z-
dc.date.created2021-05-13-
dc.date.issued2012-11-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/164263-
dc.description.abstractTo protect a network from malicious activities, intrusion detection systems can be used. Most of intrusion detection systems examine incoming packets with detection signatures to detect potential malicious packets. Because the portion of malicious packets is usually very small, it is not efficient to examine incoming packets with all signatures. In this paper, we propose a method that reduces the number of signatures to be examined and show the experimental results of our proposed method.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleBalanced indexing method for efficient intrusion detection systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1007/978-3-642-37682-5_4-
dc.identifier.scopusid2-s2.0-84876003112-
dc.identifier.bibliographicCitationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.7839 LNCS, pp.37 - 48-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.titleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.volume7839 LNCS-
dc.citation.startPage37-
dc.citation.endPage48-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusIncoming packets-
dc.subject.keywordPlusIndexing methods-
dc.subject.keywordPlusIntrusion Detection Systems-
dc.subject.keywordPlusMalicious activities-
dc.subject.keywordPlusMalicious packets-
dc.subject.keywordPlusCryptography-
dc.subject.keywordPlusIndexing (of information)-
dc.subject.keywordPlusIntrusion detection-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusPattern matching-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordAuthorIndexing-
dc.subject.keywordAuthorIntrusion Detection System-
dc.subject.keywordAuthorNetwork Security-
dc.subject.keywordAuthorPattern Matching-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-642-37682-5_4-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE