Analysis of Network Intrusion Detection Technology Based on Computer Information Security Technology

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Construction Research of Computer Network System Security based on Distributed Intrusion Detection Technology

A classified computer network is vulnerable to external and internal attacks in the Internet environment. It is difficult to get a lot of training sample of the security computer network system at the actual situation. This paper aimed to analyze the security of the computer network under the distributed intrusion detection. We studied how to increase the intrusion detection accuracy in the cas...

متن کامل

Current Intrusion Detection Techniques in Information Technology - A Detailed Analysis

It is a known fact that computer and network systems have certain design flaws which leads to security hazards. Intruders can exploit the security flaws and break the computer systems, and is very expensive and sometimes nearly impossible to fix all the design and programming errors. This suggests that prevention-based approaches are no more reliable and hence intrusion detection is needed as a...

متن کامل

Intrusion Detection Technology

Intrusion Detection (ID) is the process of monitoring events occurring in a system and signalling responsible parties when interesting (suspicious) activity occurs. Intrusion Detection Systems (IDSs) consist of 1) an agent that collects the information on the stream of monitored events, 2) an analysis engine that detects signs of intrusion, and 3) a response module that generates responses base...

متن کامل

Research on Key Technology of Network Intrusion Detection System Based on Improved GA-BPNN Algorithm

In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks. The intense demand for electronic commerce has intensified the growth of hacking incidents. Network security is a systematic concept, and the effective security policy or scheme is the primary goal of network information security. ...

متن کامل

Computer-Aided Tinnitus Detection based on Brain Network Analysis of EEG Functional Connectivity

Background: Tinnitus known as a central nervous system disorder is correlated with specific oscillatory activities within auditory and non-auditory brain areas. Several studies in the past few years have revealed that in the most tinnitus cases, the response pattern of neurons in auditory system is changed due to auditory deafferentation, which leads to variation and disruption of the brain net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2021

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/1744/4/042038