A recommended framework for anomaly intrusion detection system (IDS)
dc.contributor.author | Le, Tho | |
dc.contributor.editor | Cunningham, Douglas W. | |
dc.contributor.editor | Hofstedt, Petra | |
dc.contributor.editor | Meer, Klaus | |
dc.contributor.editor | Schmitt, Ingo | |
dc.date.accessioned | 2017-06-30T08:15:04Z | |
dc.date.available | 2017-06-30T08:15:04Z | |
dc.date.issued | 2015 | |
dc.description.abstract | Signature-based solutions for Intrusion Detection are dominant in practice despite of its incapability to detect zero-day attacks. Moreover, anomaly-based Intrusion Detection Systems (IDS), a promising approach against both known and unknown attacks, are not mature for a broad productive use. Therefore, the further development of anomaly based IDS is an imperative task to strengthen security in todays networked infrastructure. This motivates a detailed study to give a structured view of problems and challenges and of the current state in this field. For this purpose, a sound analysis of current limitations and a very comprehensive survey of research papers have been conducted. In this article, a short summary of the results of the survey is given. Furthermore, the survey led to important insights into future research efforts and a proposal for a promising future IDS architecture, which is presented in this work. | en |
dc.identifier.isbn | 978-3-88579-640-4 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | INFORMATIK 2015 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-246 | |
dc.title | A recommended framework for anomaly intrusion detection system (IDS) | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 1840 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 1829 | |
gi.conference.date | 28. September - 2. Oktober 2015 | |
gi.conference.location | Cottbus |
Dateien
Originalbündel
1 - 1 von 1