Invasion Detection Model using Two‐Stage Criterion of Detection of Network Anomalies - volodymyr-sokolov/publications GitHub Wiki
Conference Paper
Volodymyr Buriachok ,
Dmytro Ageyev
,
Oleksii Zhyltsov
,
Pavlo Skladannyi
,
Volodymyr Sokolov
The article considers the methods that affect the operation of the intrusion detection system. Using the “disconnection task,” a two-stage criterion for detecting anomalies in computer networks has been formed, which provides an analysis of network infrastructure characteristics and their identification with specific computer attacks and provides the ability to respond to possible attacks in real-time.
Anomalies; Attack; Intrusion Detection Systems; Invasion Detection Model; Neural Networks; Signature Analysis Method; Statistical Analysis Method
Neural Network; Wireless Sensor Network; Quality of Service
2020 Cybersecurity Providing in Information and Telecommunication Systems (CPITS)
7 July 2020 Kyiv, Ukraine
First Online: 23 November 2020
-
ISSN: 1613-0073
-
EID: 2-s2.0-85096946608
-
WOS: 000651092800003
-
KUBG: 33913
Buriachok, V., Ageyev, D., Zhyltsov, O., Skladannyi, P., & Sokolov, V. (2020). Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies. In Cybersecurity Providing in Information and Telecommunication Systems (Vol. 2746, pp. 23–32).
V. Buriachok, D. Ageyev, O. Zhyltsov, P. Skladannyi, and V. Sokolov, “Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies,” Cybersecurity Providing in Information and Telecommunication Systems, vol. 2746, pp. 23–32, 2020.
V. Buriachok, et al., Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies, in: Cybersecurity Providing in Information and Telecommunication Systems, vol. 2746 (2020) 23–32.