• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Intrusion Detection System ]" (5)
  1. 1. A study on evaluation method of NIDS datasets in closed military network
    Yong-bin Park, Sung-uk Shin, In-sup Lee, Vol. 21, No. 2, pp. 121-130, Apr. 2020
    10.7472/jksii.2020.21.2.121
    Keywords: dataset, Network intrusion detection system, Data evaluation, Machine Learning
  2. 2. Extraction of Network Threat Signatures Using Latent Dirichlet Allocation
    Sungil Lee, Suchul Lee, Jun-Rak Lee, Heung-youl Youm, Vol. 19, No. 1, pp. 1-10, Feb. 2018
    10.7472/jksii.2018.19.1.1
    Keywords: LDA, network threat detection, Intrusion Detection System, signature
  3. 3. Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0
    Sung-Yun Lee, Ki-Yeol Ryu, Vol. 13, No. 2, pp. 41-50, Apr. 2012
    10.7472/jksii.2012.13.2.41
    Keywords: Distributed Denial of Service, Intrusion Detection System, Jumping Window Algorithm, Snort2.9.0, TCAM
  4. 4. An Analysis of Intrusion Pattern Based on Backpropagation Algorithm
    Woo Chong-Woo, Kim Sang-Young, Vol. 5, No. 5, pp. 93-104, Oct. 2004
    Keywords: Intrusion Detection System, Back-propagation, KDD Cup '99
  5. 5. Intrusion Detection System Using the Correlation of Intrusion Signature