Implementation and Performance Evaluation of Intrusion Detection Systems under high-speed networks
暂无分享,去创建一个
[1] Norbik Bashah Idris,et al. A parallel technique for improving the performance of signature-based network intrusion detection system , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[2] D. A. Khorkov. Methods for testing network-intrusion detection systems , 2012, Scientific and Technical Information Processing.
[3] Xinli Wang,et al. Administrative evaluation of intrusion detection system , 2013, RIIT '13.
[4] Neil C. Rowe,et al. A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Sungryoul Lee,et al. Kargus: a highly-scalable software-based intrusion detection system , 2012, CCS.
[7] Ilhame El Farissi,et al. Modeling and Implementation Approach to Evaluate the Intrusion Detection System , 2015, NETYS.
[8] D. Mudzingwa,et al. A study of methodologies used in intrusion detection and prevention systems (IDPS) , 2012, 2012 Proceedings of IEEE Southeastcon.
[9] Monis Akhlaq,et al. Implementation and Evaluation of Network Intrusion Detection Systems , 2011, Network Performance Engineering.
[10] Ilhame El Farissi,et al. Performance Evaluation of an Intrusion Detection System , 2016 .
[11] William H. Sanders,et al. Intrusion Detection for Advanced Metering Infrastructures: Requirements and Architectural Directions , 2010, 2010 First IEEE International Conference on Smart Grid Communications.