Classification Approach for Intrusion Detection in Vehicle Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

P2P Traffic classification for Intrusion Detection Systems

Multiple approaches have been taken to study the classification of peer-to-peer (P2P) traffic and to study the impact of P2P on IDS/IPS systems. Majority of the approaches have used rule based or a mix of rule based and anomaly based detection algorithms. Physical setup is generally a firewall and SNORT or similar IDS/IPS solution on the WAN/ISP interface from the organization. In this paper we...

متن کامل

Moving dispersion method for statistical anomaly detection in intrusion detection systems

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Automatic Vehicle Detection Using Pixelwise Classification Approach

We present a system to detect and track moving vehicles based on the pixelwise classification approach. In this approach escapes some of the existing frameworks for detection vehicles in traffic monitoring systems. So many researchers and intelligent minds are introduces so many technique but not provided the accurate results. Proposed technique uses designed pixel wise classification method, c...

متن کامل

Anomalies Classification Approach for Network-based Intrusion Detection System

Anomaly based intrusion detection system (A-IDS) is considered to be a better option than signature based system since it does not require prior knowledge of attack signature before it can be used to detect an intrusion. However managing alarms generated by this system is more difficult than signature-based intrusion detection systems (SIDSs). This is due to the fact that S-IDS generates rich i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Wireless Engineering and Technology

سال: 2018

ISSN: 2152-2294,2152-2308

DOI: 10.4236/wet.2018.94007