Methods of intrusion detection in information security incident detection: a comparative study
The advance development in technology have made internet and online application and network usage become one of the important element in human life. With the high demand from the corporate and enterprise, more and more security appliances were developed and deployed, such as IDS (Intrusion Detection...
Main Authors: | Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Universiti Malaysia Pahang
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/23042/ http://umpir.ump.edu.my/id/eprint/23042/ http://umpir.ump.edu.my/id/eprint/23042/7/Methods%20of%20intrusion%20detection%20in%20information%20security%20incident%20detection9.pdf |
Similar Items
-
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015) -
From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions
by: Shahid, Anwar, et al.
Published: (2017) -
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018) -
Intrusion detection systems using K-means clustering system
by: Nor Dzuhairah Hani, Jamaludin
Published: (2019) -
Rough Set Significant Reduction and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)