The motivation behind the fusion of Intrusion Detection Systems was the realization that with the increasing traffic and increasing complexity of attacks, none of the present day stand-alone Intrusion Detection Systems can meet the high demand for a very high detection rate and an extremely low false positive rate. Multi-sensor fusion can be used to meet these requirements by a refinement of the combined response of different Intrusion Detection Systems. In this paper, we show the design technique of sensor fusion to best utilize the useful response from multiple sensors by an appropriate adjustment of the fusion threshold. The threshold is generally chosen according to the past experiences or by an expert system. In this paper, we show tha...
In this thesis, a sensor fusion inspired system architecture for network security is presented. A pr...
Network intrusion detection systems provide proactive defense against security threats by detecting ...
© 2016 ACM.This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (C...
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the in...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferen...
Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preference...
Computer networks are vulnerable to attacks from outside threats. Intrusion detection systems are us...
We propose a binary decision fusion rule that reaches a global decision on the presence of a target ...
False alarms and timely identification of new attacks are two of the biggest challenges to the effec...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the...
Most intrusion detection systems (IDSs) available today are using a single audit source for detectio...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
This paper focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped ...
In this thesis, a sensor fusion inspired system architecture for network security is presented. A pr...
Network intrusion detection systems provide proactive defense against security threats by detecting ...
© 2016 ACM.This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (C...
The motivation behind the fusion of Intrusion Detection Systems was the realization that with the in...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preferen...
Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for...
Various intrusion detection systems (IDSs) reported in the literature have shown distinct preference...
Computer networks are vulnerable to attacks from outside threats. Intrusion detection systems are us...
We propose a binary decision fusion rule that reaches a global decision on the presence of a target ...
False alarms and timely identification of new attacks are two of the biggest challenges to the effec...
The need for higher-level reasoning capabilities beyond low-level sensor abilities has prompted rese...
An intrusion detection system (IDS) helps to identify different types of attacks in general, and the...
Most intrusion detection systems (IDSs) available today are using a single audit source for detectio...
Intrusion Detection Systems are designed to monitor a network environment and generate alerts whenev...
This paper focuses on the design of safe and attack-resilient Cyber-Physical Systems (CPS) equipped ...
In this thesis, a sensor fusion inspired system architecture for network security is presented. A pr...
Network intrusion detection systems provide proactive defense against security threats by detecting ...
© 2016 ACM.This article focuses on the design of safe and attack-resilient Cyber-Physical Systems (C...