A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks
[article]
2018
arXiv
pre-print
Flow statistics provided by the controller are considered to be useful information that can be used to develop a network-based intrusion detection system. ...
Therefore, in this paper, we propose a 5-level hybrid classification system based on flow statistics in order to attain an improvement in the overall accuracy of the system. ...
Recently, a flow-based deep learning approach [32] has been proposed for the purpose of intrusion detection in SDNs, where the system achieved a good accuracy reaching 75.75% only on the basis of 6-flow ...
arXiv:1806.03875v1
fatcat:m4kzfzcbcfe3teimnscnbd7cey
Cyber-physical system security for networked industrial processes
2015
International Journal of Automation and Computing
The intrusion tolerance implemented in real-time control systems is the most critical layer because the real time control system directly affects the physical layer. ...
To illustrate the effectiveness of the CPS security protection approach, a networked water level control system is described as a case study in the architecture analysis and design language (AADL) environment ...
Networked water level control system The NWLCS, shown in Fig. 7 , is composed of 3 layers: supervision layer, RT control layer and physical system. ...
doi:10.1007/s11633-015-0923-9
fatcat:dzudgletdzhkhehunq6fm32bju
Minimizing false positive rate for DoS attack detection: A hybrid SDN-based approach
2019
ICT Express
In this work, we take the advantage of software-defined networking (SDN) to minimize the false positive rate of DoS attack detection systems. ...
Recently, a novel networking paradigm that provides enhanced programming abilities has been proposed to attain an efficient control and management in future networks. ...
Declaration of competing interest The authors declare that there is no conflict of interest in this paper. ...
doi:10.1016/j.icte.2019.11.002
fatcat:evy6v5bumrgj7mommghxymsmxy
P4ID: P4 Enhanced Intrusion Detection
2019
2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)
The growth in scale and capacity of networks in recent years leads to challenges of positioning and scalability of Intrusion Detection Systems (IDS). ...
With the flexibility afforded by programmable dataplanes, it is now possible to perform a new level of intrusion detection in switches themselves. ...
an intrusion detection system. ...
doi:10.1109/nfv-sdn47374.2019.9040044
dblp:conf/nfvsdn/LewisBR19
fatcat:xxxjfp5auvdf5ixfhijxokqmhm
Abstracting Packet Header Information for Intrusion Detection in High-Speed Networks
2020
FUOYE Journal of Engineering and Technology
of network flow for detecting intrusion. ...
Flow-based intrusion detection system has been proposed as an alternative to a packet-based intrusion detection system as it relies on information embedded in packet header and various statistical analyses ...
Kim et al. (2004) proposed a flow-based intrusion detection system for a robust and efficient intrusion detection system in high-speed network. ...
doi:10.46792/fuoyejet.v5i2.541
fatcat:xgternwx3zagreaismp45zims4
A Two-Level Flow-Based Anomalous Activity Detection System for IoT Networks
2020
Electronics
In this paper, we propose a two-level anomalous activity detection model for intrusion detection system in IoT networks. ...
A two-level anomalous activity detection system for IoT networks we proposed will provide a robust framework for the development of malicious activity detection system for IoT networks. ...
Figure 1 shows the types of flow-based intrusion detection systems. In this paper, we propose a two-level anomalous activity detection system for IoT networks. ...
doi:10.3390/electronics9030530
fatcat:qe6krxv3kzgivghdfprupmrlsy
DFIPS: Toward Distributed Flexible Intrusion Prevention System in Software Defined Network
2016
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering
In this paper, we propose a distributed flexible intrusion prevention system in software defined network (DFIPS). ...
Intrusion prevention system (IPS) has widely deployed as a crucial measure in traditional network architecture to protect network from malignity. ...
CONCLUSIONS AND FUTURE WORK In this paper, we present a distributed flexible intrusion prevention system in software defined network. ...
doi:10.18293/seke2016-139
dblp:conf/seke/JiaRYLS16
fatcat:gzngq3bnwvf3hhiuu64k2kjjpy
High-performance Architecture of Network Intrusion Prevention Systems
2014
EAI Endorsed Transactions on Scalable Information Systems
Software-based Network Intrusion Prevention Systems have difficulty in handling high speed links. ...
A set of network-based anomaly Intrusion Detection sensors is used in processing network traffic. ...
The data layer is composed of the network processors, as a coprocessor to achieve precise and high-performance handing in network level. ...
doi:10.4108/sis.1.3.e3
fatcat:wdxpm6z44ndgzb3vmslunq25b4
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. ...
With rapidly increasing network speeds, the capacity of the NIDS sensor can limit the ability of the system to detect intrusions. ...
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. ...
doi:10.1145/1062261.1062314
dblp:conf/cf/SchaelickeWF05
fatcat:xner754wsjcynncabyrov2rfdq
CRUTIAL: The Blueprint of a Reference Critical Information Infrastructure Architecture
[chapter]
2006
Lecture Notes in Computer Science
The largely computerised nature of critical infrastructures and the pervasive interconnection of systems all over the world have generated the problem of achieving resilience of critical information infrastructures ...
for modern critical information infrastructures in general. ...
Functionally, the information flow is controlled by basic mechanisms of the firewall and intrusion detection type, complemented and parameterised by organisation-level security policies and access control ...
doi:10.1007/11962977_1
fatcat:icn65da2qjhhbpujn5ekj4irti
Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN
2020
IEEE Access
Software defined network (SDN) centralized control intelligence and network abstraction aims to facilitate applications, service deployment, programmability, innovation and ease in configuration management ...
Our analysis shows that the proposed approach outperforms in terms of detection accuracy with a trivial trade-off speed efficiency. ...
The proposed framework achieved 85% detection accuracy using Barnyard with Snort a network-based intrusion detection system. ...
doi:10.1109/access.2020.3009849
fatcat:5p767sq2zvdojomdgg77wjs7cm
An Efficient Multi Level Intrusion Detection System for Mobile Ad-Hoc Network Using Clustering Technique
2019
International Journal of Engineering and Advanced Technology
The malicious node can also be eliminated from the network. Various modern IDS tools are analyzed with large set of attacks in multiple levels in order to maintain high reliability. ...
The proposed IDS provides high accuracy when compared to existing algorithms in all levels ...
Non compliant malicious action and file system modification are detected by this system. Suricata is a network IDS which is used to detect the threat occur in the network level. ...
doi:10.35940/ijeat.f8291.088619
fatcat:3qbl6pdz7fgvnp3sfp3entf6we
Parallel Programmable Ethernet Controllers: Performance and Security
2007
IEEE Network
The design is then extended to support a self-securing Gigabit Ethernet controller that performs intrusion detection on all network data frames. ...
The firmware on the network interface is designed to utilize these resources efficiently by exploiting frame-level, flow-level, and task-level concurrency. ...
Acknowledgments This work is supported in part by the National Science Foundation (NSF) under Grant Nos. CCR-0209174, CCF-0532448, and CNS-0532452 and by donations from Advanced Micro Devices (AMD). ...
doi:10.1109/mnet.2007.386466
fatcat:6ztile7wh5hgneu3bypr7d3qxi
Design Alternatives for a High-Performance Self-Securing Ethernet Network Interface
2007
2007 IEEE International Parallel and Distributed Processing Symposium
Detailed results obtained by simulating various software and hardware configurations show that the proposed system can achieve intrusion detection throughputs in excess of 1 Gigabit per second for fairly ...
This paper presents and evaluates a strategy for integrating the Snort network intrusion detection system into a high-performance programmable Ethernet network interface card (NIC), considering the impact ...
Background
Intrusion Detection Snort is the most popular intrusion-detection system available. ...
doi:10.1109/ipdps.2007.370290
dblp:conf/ipps/SchuffP07
fatcat:iz3art5mtzcr7kvpxxmmnjsymm
Deep Reinforcement Learning based Ensemble Model for Intrusion Detection System
2022
International Journal of Advanced Computer Science and Applications
This work suggested the potential value of reinforcement learning in building intrusion detection systems at the packet-level. ...
In this way, it can integrate flow statistics with packet information and convert intrusion detection tasks to image-associated tasks. ...
Furthermore, GAN can use to simulate a dynamic network environment for interaction. Secondly, a more robust and highaccuracy anomaly detection system can be devised. ...
doi:10.14569/ijacsa.2022.01304100
fatcat:fwkviaxa65egja3tqzvemi7nv4
« Previous
Showing results 1 — 15 out of 43,225 results