Invasion Detection Model using Two‐Stage Criterion of Detection of Network Anomalies - volodymyr-sokolov/publications GitHub Wiki

Conference Paper

Volodymyr Buriachok , Dmytro Ageyev , Oleksii Zhyltsov , Pavlo Skladannyi , Volodymyr Sokolov

Abstract

The article considers the methods that affect the operation of the intrusion detection system. Using the “disconnection task,” a two-stage criterion for detecting anomalies in computer networks has been formed, which provides an analysis of network infrastructure characteristics and their identification with specific computer attacks and provides the ability to respond to possible attacks in real-time.

Keywords

Anomalies; Attack; Intrusion Detection Systems; Invasion Detection Model; Neural Networks; Signature Analysis Method; Statistical Analysis Method

SciVal Topics

Neural Network; Wireless Sensor Network; Quality of Service


Publisher

SCImago Journal & Country Rank

2020 Cybersecurity Providing in Information and Telecommunication Systems (CPITS)

7 July 2020 Kyiv, Ukraine

First Online: 23 November 2020


Indices


Cite

APA

Buriachok, V., Ageyev, D., Zhyltsov, O., Skladannyi, P., & Sokolov, V. (2020). Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies. In Cybersecurity Providing in Information and Telecommunication Systems (Vol. 2746, pp. 23–32).

IEEE

V. Buriachok, D. Ageyev, O. Zhyltsov, P. Skladannyi, and V. Sokolov, “Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies,” Cybersecurity Providing in Information and Telecommunication Systems, vol. 2746, pp. 23–32, 2020.

CEUR-WS

V. Buriachok, et al., Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies, in: Cybersecurity Providing in Information and Telecommunication Systems, vol. 2746 (2020) 23–32.

⚠️ **GitHub.com Fallback** ⚠️