Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A two-stage flow-based intrusion detection model for next-generation networks
by
Umer, Muhammad Fahad
, Sher, Muhammad
, Bi, Yaxin
in
Architectural engineering
/ Biology and Life Sciences
/ Classification
/ Communication
/ Communications traffic
/ Computer and Information Sciences
/ Computer networks
/ Computer science
/ Convergence
/ Flow
/ International conferences
/ Intrusion
/ Intrusion detection systems
/ Multimedia
/ Network security software
/ Neural networks
/ Physical Sciences
/ Protocol
/ Security
/ Security management
/ Self organizing maps
/ Social Sciences
/ Software engineering
/ Support vector machines
/ Traffic congestion
/ Traffic flow
/ Wireless networks
/ Wireless sensor networks
2018
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A two-stage flow-based intrusion detection model for next-generation networks
by
Umer, Muhammad Fahad
, Sher, Muhammad
, Bi, Yaxin
in
Architectural engineering
/ Biology and Life Sciences
/ Classification
/ Communication
/ Communications traffic
/ Computer and Information Sciences
/ Computer networks
/ Computer science
/ Convergence
/ Flow
/ International conferences
/ Intrusion
/ Intrusion detection systems
/ Multimedia
/ Network security software
/ Neural networks
/ Physical Sciences
/ Protocol
/ Security
/ Security management
/ Self organizing maps
/ Social Sciences
/ Software engineering
/ Support vector machines
/ Traffic congestion
/ Traffic flow
/ Wireless networks
/ Wireless sensor networks
2018
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A two-stage flow-based intrusion detection model for next-generation networks
by
Umer, Muhammad Fahad
, Sher, Muhammad
, Bi, Yaxin
in
Architectural engineering
/ Biology and Life Sciences
/ Classification
/ Communication
/ Communications traffic
/ Computer and Information Sciences
/ Computer networks
/ Computer science
/ Convergence
/ Flow
/ International conferences
/ Intrusion
/ Intrusion detection systems
/ Multimedia
/ Network security software
/ Neural networks
/ Physical Sciences
/ Protocol
/ Security
/ Security management
/ Self organizing maps
/ Social Sciences
/ Software engineering
/ Support vector machines
/ Traffic congestion
/ Traffic flow
/ Wireless networks
/ Wireless sensor networks
2018
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A two-stage flow-based intrusion detection model for next-generation networks
Journal Article
A two-stage flow-based intrusion detection model for next-generation networks
2018
Request Book From Autostore
and Choose the Collection Method
Overview
The next-generation network provides state-of-the-art access-independent services over converged mobile and fixed networks. Security in the converged network environment is a major challenge. Traditional packet and protocol-based intrusion detection techniques cannot be used in next-generation networks due to slow throughput, low accuracy and their inability to inspect encrypted payload. An alternative solution for protection of next-generation networks is to use network flow records for detection of malicious activity in the network traffic. The network flow records are independent of access networks and user applications. In this paper, we propose a two-stage flow-based intrusion detection system for next-generation networks. The first stage uses an enhanced unsupervised one-class support vector machine which separates malicious flows from normal network traffic. The second stage uses a self-organizing map which automatically groups malicious flows into different alert clusters. We validated the proposed approach on two flow-based datasets and obtained promising results.
Publisher
Public Library of Science,Public Library of Science (PLoS)
Subject
MBRLCatalogueRelatedBooks
Related Items
Related Items
This website uses cookies to ensure you get the best experience on our website.