Reference Hub3
Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework

Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework

Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad
Copyright: © 2011 |Volume: 5 |Issue: 4 |Pages: 12
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781613507582|DOI: 10.4018/jisp.2011100104
Cite Article Cite Article

MLA

Sallay, Hassen, et al. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework." IJISP vol.5, no.4 2011: pp.47-58. http://doi.org/10.4018/jisp.2011100104

APA

Sallay, H., Rouached, M., Ammar, A., Ben Fredj, O., Al-Shalfan, K., & Ben Saad, M. (2011). Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework. International Journal of Information Security and Privacy (IJISP), 5(4), 47-58. http://doi.org/10.4018/jisp.2011100104

Chicago

Sallay, Hassen, et al. "Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework," International Journal of Information Security and Privacy (IJISP) 5, no.4: 47-58. http://doi.org/10.4018/jisp.2011100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and more flexible to conceal the crime evidences. Although people are in an unsafe digital environment, they often feel safe. Being aware of this fact and this fiction, the authors draw in this paper a security framework aiming to build real-time security solutions in the very narrow context of high speed networks. This framework is called (f|p) since it is inspired by the elefant self-defense behavior which yields p (22 security tasks for 7 security targets).

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.