Mallissery et al., 2011 - Google Patents
Survey on intrusion detection methodsMallissery et al., 2011
View PDF- Document ID
- 10202905201216309502
- Author
- Mallissery S
- Prabhu J
- Ganiga R
- Publication year
External Links
Snippet
Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's …
- 238000001514 detection method 0 title abstract description 29
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2428—Tag details
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/246—Check out systems combined with EAS, e.g. price information stored on EAS tag
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions | |
Bijone | A survey on secure network: intrusion detection & prevention approaches | |
Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
Khalaf et al. | An adaptive protection of flooding attacks model for complex network environments | |
Pradhan et al. | Intrusion detection system (IDS) and their types | |
Kumar et al. | Intrusion detection systems: a review | |
Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
Akbar et al. | Intrusion detection system methodologies based on data analysis | |
Beg et al. | Feasibility of intrusion detection system with high performance computing: A survey | |
Frye et al. | An ontology-based system to identify complex network attacks | |
Mangrulkar et al. | Network attacks and their detection mechanisms: A review | |
Ádám et al. | Artificial neural network based IDS | |
Qin et al. | Integrating intrusion detection and network management | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Gandhi et al. | Detecting and preventing attacks using network intrusion detection systems | |
Mallissery et al. | Survey on intrusion detection methods | |
Kazienko et al. | Intrusion detection systems (IDS) Part 2-Classification; methods; techniques | |
Raut | Log based intrusion detection system | |
Dadkhah et al. | Alert correlation through a multi components architecture | |
Lakra | HSNORT: A Hybrid intrusion detection system using artificial intelligence with snort | |
Nalavade et al. | Intrusion prevention systems: data mining approach | |
Prabhu et al. | Network intrusion detection system | |
Singh et al. | A review on intrusion detection system | |
Agrawal et al. | Proposed multi-layers intrusion detection system (MLIDS) model | |
Dao | Research and deploy a network attack detection and warning system using snort |