Nothing Special   »   [go: up one dir, main page]

Mallissery et al., 2011 - Google Patents

Survey on intrusion detection methods

Mallissery et al., 2011

View PDF
Document ID
10202905201216309502
Author
Mallissery S
Prabhu J
Ganiga R
Publication year

External Links

Snippet

Intrusions in an information system are the activities that violate the security policy of the system, and intrusion detection is the process used to identify intrusions. Intrusion detection has been studied for approximately 20 years. It is based on the beliefs that an intruder's …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/246Check out systems combined with EAS, e.g. price information stored on EAS tag

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
Bijone A survey on secure network: intrusion detection & prevention approaches
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Khalaf et al. An adaptive protection of flooding attacks model for complex network environments
Pradhan et al. Intrusion detection system (IDS) and their types
Kumar et al. Intrusion detection systems: a review
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Akbar et al. Intrusion detection system methodologies based on data analysis
Beg et al. Feasibility of intrusion detection system with high performance computing: A survey
Frye et al. An ontology-based system to identify complex network attacks
Mangrulkar et al. Network attacks and their detection mechanisms: A review
Ádám et al. Artificial neural network based IDS
Qin et al. Integrating intrusion detection and network management
Beigh et al. Intrusion detection and prevention system: issues and challenges
Gandhi et al. Detecting and preventing attacks using network intrusion detection systems
Mallissery et al. Survey on intrusion detection methods
Kazienko et al. Intrusion detection systems (IDS) Part 2-Classification; methods; techniques
Raut Log based intrusion detection system
Dadkhah et al. Alert correlation through a multi components architecture
Lakra HSNORT: A Hybrid intrusion detection system using artificial intelligence with snort
Nalavade et al. Intrusion prevention systems: data mining approach
Prabhu et al. Network intrusion detection system
Singh et al. A review on intrusion detection system
Agrawal et al. Proposed multi-layers intrusion detection system (MLIDS) model
Dao Research and deploy a network attack detection and warning system using snort