User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 Views 31
 Downloands 3
Comparison of the Host Based Intrusion Detection Systems and Network Based Intrusion Detection Systems
2022
Journal:  
Celal Bayar Üniversitesi Fen Bilimleri Dergisi
Author:  
Abstract:

Recently, Advanced Persistent Threat (APT) has emerged as sophisticated and tailor-made attacks. APTs pose threats mainly targeting institutions such as military, defense and security infrastructure, high profile companies and governments etc. Particularly as a counter measure for APT attacks done by hactivists and cyber warriors and cyber terrorists over government institutions and e-government applications intrusion detection mechanisms are of crucial importance in effective defense. In this study, Intrusion detection and prevention systems have been studied in detail after being referred to the tasks and abilities of the intrusion detection systems that are at the core of the computer security technology presented today in order to meet the increasing need for information and network security. This paper’s aim is the specifying the differences between Host Based Intrusion Detection Systems (HIDS) and Network Based Intrusion Detection Systems (NIDS) and compares the tools which are using HIDS and NIDS. It is asserted that in order to have a better assurance for APT attacks there should be set up a Hybrid IDS approach covering both networks and hosts using both signature and behavioral detection mechanism based on machine learning.

Keywords:

null
2022
Author:  
0
2022
Author:  
Citation Owners
Information: There is no ciation to this publication.
Similar Articles












Celal Bayar Üniversitesi Fen Bilimleri Dergisi

Field :   Fen Bilimleri ve Matematik; Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 762
Cite : 732
2023 Impact : 0.029
Celal Bayar Üniversitesi Fen Bilimleri Dergisi