Open Access Open Access  Restricted Access Subscription Access

A Survey of Pattern Matching Algorithem in Intrusion Detection System Tehran, Iran


Affiliations
1 Iran Telecom Research Center, Tehran, Iran, Islamic Republic of
2 Department of Computer Engineering University of Tehran, Kish International Campus, Tehran, Iran, Islamic Republic of
 

The usual approach of Intrusion Detection System (IDS) systematic is according to model compatibility which determines the vandalism happening on the network using particular models and orders. To perform this algorithm, casual manner of the network are evaluated by modeling and in the next step it utilized as a draft model for specifying unusual manner. This paper, wants to determine and select the most efficient procedure for this performance by investigation, application and also gathering all kinds of model compatibility technique so that the most proper result is achieved over compatibility known attacks with original models. In this study, to gather all procedures associated with the subject, we surveyed the expressing of model adoption performance from various views. The other context of this study is to evaluate the items for setting the procedures whereas the algorithms are categorized according to significant items which has more influence on the operating of model adoption performance.

Keywords

Intrusion Detection System, Network, Model Compatibility, Search Procedure.
User

Abstract Views: 125

PDF Views: 0




  • A Survey of Pattern Matching Algorithem in Intrusion Detection System Tehran, Iran

Abstract Views: 125  |  PDF Views: 0

Authors

Gharaee Hossein
Iran Telecom Research Center, Tehran, Iran, Islamic Republic of
Seifi Shokoufeh
Department of Computer Engineering University of Tehran, Kish International Campus, Tehran, Iran, Islamic Republic of
Solat Abozar
Iran Telecom Research Center, Tehran, Iran, Islamic Republic of

Abstract


The usual approach of Intrusion Detection System (IDS) systematic is according to model compatibility which determines the vandalism happening on the network using particular models and orders. To perform this algorithm, casual manner of the network are evaluated by modeling and in the next step it utilized as a draft model for specifying unusual manner. This paper, wants to determine and select the most efficient procedure for this performance by investigation, application and also gathering all kinds of model compatibility technique so that the most proper result is achieved over compatibility known attacks with original models. In this study, to gather all procedures associated with the subject, we surveyed the expressing of model adoption performance from various views. The other context of this study is to evaluate the items for setting the procedures whereas the algorithms are categorized according to significant items which has more influence on the operating of model adoption performance.

Keywords


Intrusion Detection System, Network, Model Compatibility, Search Procedure.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i21%2F133804