Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (1)

Search Parameters:
Keywords = heuristic algorithm, flags

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 512 KiB  
Article
Multivariable Heuristic Approach to Intrusion Detection in Network Environments
by Marcin Niemiec, Rafał Kościej and Bartłomiej Gdowski
Entropy 2021, 23(6), 776; https://doi.org/10.3390/e23060776 - 19 Jun 2021
Cited by 7 | Viewed by 3250
Abstract
The Internet is an inseparable part of our contemporary lives. This means that protection against threats and attacks is crucial for major companies and for individual users. There is a demand for the ongoing development of methods for ensuring security in cyberspace. A [...] Read more.
The Internet is an inseparable part of our contemporary lives. This means that protection against threats and attacks is crucial for major companies and for individual users. There is a demand for the ongoing development of methods for ensuring security in cyberspace. A crucial cybersecurity solution is intrusion detection systems, which detect attacks in network environments and responds appropriately. This article presents a new multivariable heuristic intrusion detection algorithm based on different types of flags and values of entropy. The data is shared by organisations to help increase the effectiveness of intrusion detection. The authors also propose default values for parameters of a heuristic algorithm and values regarding detection thresholds. This solution has been implemented in a well-known, open-source system and verified with a series of tests. Additionally, the authors investigated how updating the variables affects the intrusion detection process. The results confirmed the effectiveness of the proposed approach and heuristic algorithm. Full article
(This article belongs to the Special Issue Statistical Methods in Malware Mitigation)
Show Figures

Figure 1

Back to TopTop