Development of a network-based: Intrusion Prevention System using a Data Mining approach
Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antiviruses and any security applications, by actively responding to att...
Saved in:
Published in | 2013 Science and Information Conference pp. 641 - 644 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
The Science and Information Organization
01.10.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antiviruses and any security applications, by actively responding to attacks and affording great flexibility when dealing with security threats. |
---|---|
AbstractList | Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further than the functionality of Intrusion Detection Systems (IDS), firewalls, antiviruses and any security applications, by actively responding to attacks and affording great flexibility when dealing with security threats. |
Author | Al-Hamami, Alaa Hussein Al-Saadoon, Ghossoon M. Waleed |
Author_xml | – sequence: 1 givenname: Alaa Hussein surname: Al-Hamami fullname: Al-Hamami, Alaa Hussein organization: Comput. Sci. Dept., Amman Arab Univ., Amman, Jordan – sequence: 2 givenname: Ghossoon M. Waleed surname: Al-Saadoon fullname: Al-Saadoon, Ghossoon M. Waleed organization: Manage. Inf. Syst. Dept., Appl. Sci. Univ., Manama, Bahrain |
BookMark | eNrjYmDJy89LZWTgMrC0sDQ2tDQ2iOBkiHBJLUvNyS_ITc0rUchPU0hUyEstKc8vytZNSixOTbFS8MwrKSotzszPUwgoAirNKwExgyuLS1JzFYDieelALS6JJYkKvpl5YF5BQVF-YnIGDwNrWmJOcSovlOZmkHZzDXH20M1MTU2NLyjKzE0sqow3MzMztDAwN8YvCwCSEjrC |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 098931930X 9780989319300 |
EndPage | 644 |
ExternalDocumentID | 6661807 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-ieee_primary_66618073 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:37:41 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-ieee_primary_66618073 |
ParticipantIDs | ieee_primary_6661807 |
PublicationCentury | 2000 |
PublicationDate | 2013-Oct. |
PublicationDateYYYYMMDD | 2013-10-01 |
PublicationDate_xml | – month: 10 year: 2013 text: 2013-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2013 Science and Information Conference |
PublicationTitleAbbrev | SAI |
PublicationYear | 2013 |
Publisher | The Science and Information Organization |
Publisher_xml | – name: The Science and Information Organization |
Score | 3.1183584 |
Snippet | Intrusion Prevention Systems (IPS) can analyse, detect and prevent intruder attacks. IPS provide a good service in securing the network, which goes further... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 641 |
SubjectTerms | Algorithm design and analysis Clustering algorithms Data mining Internet Protocol Intrusion detection Intrusion Prevention System IP networks K-Means PF-G Algorithm Ports (Computers) |
Title | Development of a network-based: Intrusion Prevention System using a Data Mining approach |
URI | https://ieeexplore.ieee.org/document/6661807 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VTkyAWgQUkAdGEohj54MVqApSEANI2SrbuTAgOQzpwq-vzyblQx3YTpZsn255J_u9dwAXktYF1xGWSKbarodTXOWRcWhjtJRGIQmcq6ds8Soea1mP4HKjhUFETz7DmEL_l990ZkVPZVeu1U4Kko7vFNc8aLV-DUXxmDDfg2o4LVBB3uNVr2Pz-cdo8b_X7cP0W33Hnje4cgAjtBOof7B7WNcyxWwgcEeEQ80Ne7Akn3BVZoMrkwuDHzkjcvub23KnesUqPxKCDWbiU5jN719uFxFltvwI5hPLr6TSQxjbzuIRsFRnIjM6T01ZitIkOs3bRCgusRCiMe0xTLadcLJ9eQa7nCY-eL7aKYxd7njmcLfX577ga2jJju0 |
link.rule.ids | 310,311,786,790,795,796,802,55109 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED1VZYAJUIuA8uGBkQSS2EnTFahSaCqGImWLbOfCgJR0SBd-PT6nKR_qwGadZPt8y7Ps994B3AiKc185GCOZaps7nPRl5GiDNloJoSWSwDldhMkbf85E1oPbrRYGES35DF0a2r_8otZreiq7M1dtb0zS8T2D8_dxq9b61RbFosL0ENJuvZYM8uGuG-Xqzz9Wi__d8AiG3_o79rpFlmPoYTWA7Ae_h9Ulk6xqKdwOIVExYbOKBBSmzqzzZTLD1pGcEb393Ux5lI1kqW0KwTo78SGMpk_Lh8ShzPJVaz-Rb5IKTqBf1RWeAgtUyEOtokDHMY-1p4Ko9Lj0BY45L3R5BoNdK5zvDl_DfrJM5_l8tngZwYFP_R8se-0C-uYceGlQuFFXtvhfHBqSQw |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+Science+and+Information+Conference&rft.atitle=Development+of+a+network-based%3A+Intrusion+Prevention+System+using+a+Data+Mining+approach&rft.au=Al-Hamami%2C+Alaa+Hussein&rft.au=Al-Saadoon%2C+Ghossoon+M.+Waleed&rft.date=2013-10-01&rft.pub=The+Science+and+Information+Organization&rft.spage=641&rft.epage=644&rft.externalDocID=6661807 |