JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design and Analysis of Multiple Intrusion Detection Model
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design and Analysis of Multiple Intrusion Detection Model
Lee, Yo-Seob;
  PDF(new window)
 Abstract
Intrusion detection model detects a intrusion when intrusion behaviour occurred. The model analyzes a variety of intrusion pattern and supports a modeling method to represent for a intrusion pattern efficiently. Particularly, the model defines classes of intrusion pattern and supports modeling method that detects a network level intrusion through multiple hosts for multiple intrusions. In this paper, proposes a multiple intrusion detection model that support a verification method for intrusion detection systems and verifies a safeness of proposed model and compares with other models.
 Keywords
Intrusion Detection;Intrusion Detection Model;Multiple Intrusions;
 Language
Korean
 Cited by
 References
1.
S. Sonawane, "A survey on intrusion detection techniques," World J. of Science and Technology, vol. 2, no. 3, 2012, pp. 127-133.

2.
Y. Chun, "Hacking Detection Mechanism of Cyber Attacks Modeling," J. of the Korea Institute of Electronic Communication Sciences, vol. 8, no. 9, 2013, pp. 1313-1318. crossref(new window)

3.
Y. Kim, "IDS Performance on MANET with Packet Aggregation Transmissions," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 6, 2014, pp. 695-701. crossref(new window)

4.
S. Park, "Current Status and Analysis of Domestic Security Monitoring Systems," J. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, 2014, pp. 261-266. crossref(new window)

5.
D. Denning, "An Intrusion Detection Model," IEEE Trans. Software Engineering, vol. 13, no. 2, Feb. 1987, pp. 222-232.

6.
B. Jasiul, "Detection and Modeling of Cyber Attacks with Petri Nets," Entropy, vol. 16, no. 12, 2014, pp. 6602-6623. crossref(new window)

7.
K. Jensen and L. Kristensen, "Colored Petri Nets - Modeling and Validation of Concurrent Systems," Springer-Verlag Berlin, 2009.

8.
S. Shieh and D. Gligor, "On a Pattern-Oriented Model for Intrusion Detection," IEEE Trans. Knowledge and Data Engineering, vol. 9, no. 4, Aug. 1997, pp. 661-667. crossref(new window)

9.
S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D's Thesis, Purdue University, Aug. 1995.