An Embedded Intrusion Detection System Model for Application Program

被引:0
|
作者
Wu, Shaofei [1 ]
Chen, Yan [2 ]
机构
[1] WuHan Inst Technol, Sch Engn & Comp Sci, Wuhan 430073, HuBei, Peoples R China
[2] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
来源
PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS | 2008年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Intrusion Detection is an effective security mechanism developed in the recent decade. Because of its wide applicability, intrusion detection becomes the key part of the security mechanism. The modern technologies and models in intrusion detection field are categorized and studied. The characters of current practical IDS are introduced. The theories and realization of IDS based on applications are presented. The basic ideas concerned with how to design and realize the embedded IDS for application are proposed.
引用
收藏
页码:1861 / +
页数:2
相关论文
共 50 条
  • [31] Application of Data Mining on the Design of Intrusion Detection System
    Chang Zhen-yun
    Du Yan-fang
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
  • [32] APPLICATION OF ARTIFICIAL NEURAL NETWORKS IN THE INTRUSION DETECTION SYSTEM
    Mustafaev, Arslan G.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2018, 10 (04): : 57 - 66
  • [33] Application of data mining technology to intrusion detection system
    Xia, HX
    Qi, S
    Rui, H
    DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
  • [34] A Practical Application of a Dataset Analysis in an Intrusion Detection System
    Fernandez, Diego
    Vigoya, Laura
    Cacheda, Fidel
    Novoa, Francisco J.
    Lopez-Vizcaino, Manuel F.
    Carneiro, Victor
    2018 IEEE 17TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2018,
  • [35] Application of Deep Learning Technique in an Intrusion Detection System
    Saraeian, Shideh
    Golchi, Mahya Mohammadi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2020, 19 (02)
  • [36] Research on the application of honeypot technology in Intrusion Detection System
    Suo, Xiangfeng
    Han, Xue
    Gao, Yunhui
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 1030 - 1032
  • [37] APPLICATION OF FUZZY CLUSTERING ALGORITHM IN INTRUSION DETECTION SYSTEM
    Li Yun
    Wu Jie-fang
    Liu Xue-cheng
    3RD INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE (IEEC 2011), PROCEEDINGS, 2011, : 297 - 300
  • [38] Effective intrusion detection model through the combination of a signature-based intrusion detection system and a machine learning-based intrusion detection system
    Weon, Ill-Young
    Song, Doo Heon
    Lee, Chang-Hoon
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (06) : 1447 - 1464
  • [39] Intrusion detection system evaluation model based on model checking
    Xu, Pengtao
    Zhu, Weijun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 723 - 727
  • [40] Embedded System Application For Sunn Pest Detection
    Yazgac, Bilgi Gorkem
    Kirci, Murvet
    2017 6TH INTERNATIONAL CONFERENCE ON AGRO-GEOINFORMATICS, 2017, : 349 - 354