From intrusion detection to an intrusion response system: Fundamentals, requirements, and future directions
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs)...
Published in: | Algorithms |
---|---|
Main Author: | Anwar S.; Zain J.M.; Zolkipli M.F.; Inayat Z.; Khan S.; Anthony B.; Chang V. |
Format: | Review |
Language: | English |
Published: |
MDPI AG
2017
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85020650273&doi=10.3390%2fa10020039&partnerID=40&md5=69a3404f8a1be1b505826d0b2f84b3f8 |
Similar Items
-
Deep Learning-Based High Performance Intrusion Detection System for Imbalanced Datasets
by: Ahmed F.; Gunawan T.S.; Nordin A.N.; Rahim R.A.; Zain Z.M.; Zaki Hamidi E.A.
Published: (2023) -
Network intrusion detection system using immune-genetic algorithm (IGA)
by: Suhaimi H.; Suliman S.I.; Musirin I.; Harun A.; Mohamad R.; Kassim M.; Shahbudin S.
Published: (2019) -
Non-intrusive SSL/TLS proxy implementation and issues
by: Jawi S.M.; Ali F.H.M.
Published: (2015) -
Tidal influence on seawater intrusion in unconfined coastal aquifers
by: Kuan W.K.; Jin G.; Xin P.; Robinson C.; Gibbes B.; Li L.
Published: (2012) -
The shear strength and electron microscopy of laterite soil with the intrusion of polyurethane
by: Lat D.C.; Jais I.B.M.; Ahmad N.H.; Abdullah M.; Razali R.; Noor S.N.A.M.; Rahman N.S.A.
Published: (2021)