Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Rule indexing for efficient intrusion detection systems

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Boojoong-
dc.contributor.authorKim, Hye Seon-
dc.contributor.authorYang, Ji Su-
dc.contributor.authorIm, Eul Gyu-
dc.date.accessioned2022-07-16T19:24:14Z-
dc.date.available2022-07-16T19:24:14Z-
dc.date.created2021-05-13-
dc.date.issued2011-08-
dc.identifier.issn0302-9743-
dc.identifier.urihttps://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/167811-
dc.description.abstractAs the use of the Internet has increased tremendously, the network traffic involved in malicious activities has also grown significantly. To detect and classify such malicious activities, Snort, the open-sourced network intrusion detection system, is widely used. Snort examines incoming packets with all Snort rules to detect potential malicious packets. Because the portion of malicious packets is usually small, it is not efficient to examine incoming packets with all Snort rules. In this paper, we apply two indexing methods to Snort rules, Prefix Indexing and Random Indexing, to reduce the number of rules to be examined. We also present experimental results with the indexing methods.-
dc.language영어-
dc.language.isoen-
dc.publisherSpringer Verlag-
dc.titleRule indexing for efficient intrusion detection systems-
dc.typeArticle-
dc.contributor.affiliatedAuthorIm, Eul Gyu-
dc.identifier.doi10.1007/978-3-642-27890-7_11-
dc.identifier.scopusid2-s2.0-84863251014-
dc.identifier.bibliographicCitationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.7115 LNCS, pp.136 - 141-
dc.relation.isPartOfLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.titleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.citation.volume7115 LNCS-
dc.citation.startPage136-
dc.citation.endPage141-
dc.type.rimsART-
dc.type.docTypeConference Paper-
dc.description.journalClass1-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusIncoming packets-
dc.subject.keywordPlusIndexing methods-
dc.subject.keywordPlusintrusion detection system-
dc.subject.keywordPlusIntrusion Detection Systems-
dc.subject.keywordPlusMalicious activities-
dc.subject.keywordPlusMalicious packets-
dc.subject.keywordPlusNetwork intrusion detection systems-
dc.subject.keywordPlusNetwork traffic-
dc.subject.keywordPlusRandom indexing-
dc.subject.keywordPlusSnort-
dc.subject.keywordPlusComputer crime-
dc.subject.keywordPlusIntrusion detection-
dc.subject.keywordPlusNetwork security-
dc.subject.keywordPlusPattern matching-
dc.subject.keywordPlusWebsites-
dc.subject.keywordPlusIndexing (of information)-
dc.subject.keywordAuthorindexing-
dc.subject.keywordAuthorintrusion detection system-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorpattern matching-
dc.subject.keywordAuthorSnort-
dc.identifier.urlhttps://link.springer.com/chapter/10.1007/978-3-642-27890-7_11-
Files in This Item
Go to Link
Appears in
Collections
서울 공과대학 > 서울 컴퓨터소프트웨어학부 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Im, Eul Gyu photo

Im, Eul Gyu
COLLEGE OF ENGINEERING (SCHOOL OF COMPUTER SCIENCE)
Read more

Altmetrics

Total Views & Downloads

BROWSE