A Novelty Network Attack Detection Model based on Immunology

Author(s):  
Xiyue Chen ◽  
Jianmin Pang
2021 ◽  
Vol 37 (1) ◽  
pp. 121-133
Author(s):  
Zihao Shen ◽  
Hui Wang ◽  
Kun Liu ◽  
Peiqian Liu ◽  
Menglong Ba ◽  
...  

2019 ◽  
Vol 16 (10) ◽  
pp. 112-132
Author(s):  
Lingtao Qi ◽  
Haiping Huang ◽  
Feng Li ◽  
Reza Malekian ◽  
Ruchuan Wang

2020 ◽  
Vol 161 ◽  
pp. 172-182
Author(s):  
Jin Yang ◽  
Tao Li ◽  
Gang Liang ◽  
YunPeng Wang ◽  
TianYu Gao ◽  
...  

Author(s):  
S. Toliupa ◽  
O. Pliushch ◽  
I. Parhomenko

The article proposes a combinatorial construction of a network attack detection system based on selected methods of data mining and conducts experimental research that confirms the effectiveness of the created detection model to protect the distributed information network. Experiments with a software prototype showed the high quality of detection of network attacks and proved the correctness of the choice of methods of data mining and the applicability of the developed techniques. The state of security of information and telecommunication systems against cyberattacks is analyzed, which allowed to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management. An analysis of publications of domestic and foreign experts, which summarizes: experience in building attack detection systems, their disadvantages and advantages; of attack and intrusion detection systems based on the use of intelligent systems. Based on the results of the review, proposals were formed on: construction of network attack detection systems on the basis of selected methods of data mining and experimental research, which confirms the effectiveness of the created detection model for the protection of the distributed information network.


2021 ◽  
Author(s):  
Yanjing Yang ◽  
Min Gao ◽  
Yuerang Li ◽  
Fan Wu ◽  
Jia Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document