Digital Library


Search: "[ keyword: Intrusion Detection System ]" (14)
    Intrusion Detection-Based Access Control Algorithm for PostgreSQL Based on Front-End Back-End Protocols
    Seong-Hoon Jwa, Seung-Hee Kim The Transactions of the Korea Information Processing Society, Vol. 14, No. 8, pp. 595-607, Aug. 2025
    https://doi.org/10.3745/TKIPS.2025.14.8.595
    Keywords: Database access control, FEBE Protocol Analysis, intrusion detection system (IDS), PostgreSQL Security

    Optimization of HIDS Sliding Window Parameters for Enhanced Security: A Risk Tolerance-Based Approach
    Park Sang Joon, Kim Mi Soo The Transactions of the Korea Information Processing Society, Vol. 14, No. 7, pp. 506-515, Jul. 2025
    https://doi.org/10.3745/TKIPS.2025.14.7.506
    Keywords: Microservice Architecture (MSA), Host-based Intrusion Detection System (HIDS), sliding window, Risk Tolerance, Container security, Parameter optimization

    The Hybrid Model using SVM and Decision Tree for Intrusion Detection
    Nam Kyoung Um , Sung Hee Woo , Sang Ho Lee The KIPS Transactions:PartC, Vol. 14, No. 1, pp. 1-6, Feb. 2007
    10.3745/KIPSTC.2007.14.1.1

    Design and Implementation of Sensor based Intrusion Detection System
    Jong Moo Choi , Seong Je Cho The KIPS Transactions:PartC, Vol. 12, No. 6, pp. 865-874, Oct. 2005
    10.3745/KIPSTC.2005.12.6.865

    A Statistic-based Response System against DDoS Using Legitimated IP Table
    Pil Yong Park , Choong Seon Hong , Sang Hyun Choi The KIPS Transactions:PartC, Vol. 12, No. 6, pp. 827-838, Oct. 2005
    10.3745/KIPSTC.2005.12.6.827

    Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
    Jung Sook Jang , Yong Hee Jeon , Jong Soo Jang The KIPS Transactions:PartC, Vol. 12, No. 6, pp. 817-826, Oct. 2005
    10.3745/KIPSTC.2005.12.6.817

    A Combination of Signature-based IDS and Machine Learning-based IDS using Alpha-cut and Beta pick
    Ill Young Weon , Doo Heon Song , Chang Hoon Lee The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 609-616, Aug. 2005
    10.3745/KIPSTC.2005.12.4.609

    An Optimum-adaptive Intrusion Detection System Using a Mobile Code
    Se Chung Pang , Yang Woo Kim , Yoon Hee Kim , Phil Woo Lee The KIPS Transactions:PartC, Vol. 12, No. 1, pp. 45-52, Feb. 2005
    10.3745/KIPSTC.2005.12.1.45

    Experiments on An Network Processor-based Intrusion Detection
    Hyeong Ju Kim , Ik Kyun Kim , Dae Chul Park The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 319-326, Jun. 2004
    10.3745/KIPSTC.2004.11.3.319

    Applying Packet based Machine Learning Algorithm to Misuse IDS for Better Performance
    Ill Young Weon , Doo Heon Song , Chang Hoon Lee The KIPS Transactions:PartC, Vol. 11, No. 3, pp. 301-308, Jun. 2004
    10.3745/KIPSTC.2004.11.3.301