• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Intrusion Detection System Using the Correlation of Intrusion Signature


Na Guen-Sik, Journal of Internet Computing and Services, Vol. 5, No. 2, pp. 57-68, Apr. 2004
Full Text:
Keywords: Intrusion Detection, intrusion Signature, IDS : Intrusion Detection System

Abstract

In this paper we present the architecture of intrusion detection system that enhances the performance of system and the correctness of intrusion detection. A network intrusion is usually composed of several steps of action taken by the attackers. Each action in the steps can be characterized by its signature. But normal and non-intrusive action can also include the same signature, It can result in incorrect detection. The presented system uses the correlation of series of signatures that consist of an intrusion. So Its decision on an intrusion is highly reliable. And variations of known intrusions can easily be detected without any knowledge of the variations.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Guen-Sik, N. (2004). Intrusion Detection System Using the Correlation of Intrusion Signature. Journal of Internet Computing and Services, 5(2), 57-68.

[IEEE Style]
N. Guen-Sik, "Intrusion Detection System Using the Correlation of Intrusion Signature," Journal of Internet Computing and Services, vol. 5, no. 2, pp. 57-68, 2004.

[ACM Style]
Na Guen-Sik. 2004. Intrusion Detection System Using the Correlation of Intrusion Signature. Journal of Internet Computing and Services, 5, 2, (2004), 57-68.