A Generic Scheme for the Construction of Contextual Signatures with Hash Function in Intrusion Detection.
Yuxin MengLam-for KwokPublished in: CIS (2011)
Keyphrases
- intrusion detection
- hash functions
- anomaly detection
- intrusion detection system
- network security
- network intrusion detection
- signature scheme
- similarity search
- network traffic
- high detection rate
- provably secure
- binary codes
- network intrusion
- data mining
- data distribution
- detecting anomalous
- hash tables
- computer security
- secret key
- hash table
- encryption scheme
- neural network
- alert correlation
- data mining techniques
- network intrusions
- hamming distance