Balanced indexing method for efficient intrusion detection systems
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, Boojoong | - |
dc.contributor.author | Kim, Hye Seon | - |
dc.contributor.author | Yang, Ji Su | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-07-16T12:53:56Z | - |
dc.date.available | 2022-07-16T12:53:56Z | - |
dc.date.created | 2021-05-13 | - |
dc.date.issued | 2012-11 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/164263 | - |
dc.description.abstract | To protect a network from malicious activities, intrusion detection systems can be used. Most of intrusion detection systems examine incoming packets with detection signatures to detect potential malicious packets. Because the portion of malicious packets is usually very small, it is not efficient to examine incoming packets with all signatures. In this paper, we propose a method that reduces the number of signatures to be examined and show the experimental results of our proposed method. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer Verlag | - |
dc.title | Balanced indexing method for efficient intrusion detection systems | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/978-3-642-37682-5_4 | - |
dc.identifier.scopusid | 2-s2.0-84876003112 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.7839 LNCS, pp.37 - 48 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 7839 LNCS | - |
dc.citation.startPage | 37 | - |
dc.citation.endPage | 48 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Incoming packets | - |
dc.subject.keywordPlus | Indexing methods | - |
dc.subject.keywordPlus | Intrusion Detection Systems | - |
dc.subject.keywordPlus | Malicious activities | - |
dc.subject.keywordPlus | Malicious packets | - |
dc.subject.keywordPlus | Cryptography | - |
dc.subject.keywordPlus | Indexing (of information) | - |
dc.subject.keywordPlus | Intrusion detection | - |
dc.subject.keywordPlus | Network security | - |
dc.subject.keywordPlus | Pattern matching | - |
dc.subject.keywordPlus | Computer crime | - |
dc.subject.keywordAuthor | Indexing | - |
dc.subject.keywordAuthor | Intrusion Detection System | - |
dc.subject.keywordAuthor | Network Security | - |
dc.subject.keywordAuthor | Pattern Matching | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-642-37682-5_4 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.