Cognitive Analysis of Intrusion Detection System

نویسندگان

چکیده

Usability evaluation methods have gained a substantial attention in networks particularly Intrusion Detection System (IDS) as these are envisioned to achieve usability and define defects for large number of practical software’s. Despite good available survey on evaluation, we feel that there is gap existing literature terms methods, IDS interfaces following guidelines development. This paper reviews the state art improving illustrates issues challenges context design matters. Further, propose taxonomy key problems. We also heuristics users improves detection interface compared conventional heuristics. The similarities differences problems summarized basis factors, current loopholes

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Network Intrusion Forensic Analysis Using Intrusion Detection System

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

متن کامل

IDS-COG - Intrusion Detection System for Cognitive Radio Network

An Intrusion Detection System (IDS) for Cognitive Radio Network (CRN) is proposed. The considered IDS is constructed by combining two classic mechanisms for CRN intrusion detection, namely the Localization mechanism and the Reputation mechanism. The composition of the mechanisms is done with the aid of a Genetic Algorithm (GA) responsible for calibrating the IDS, that is, for attributing “weigh...

متن کامل

Towards a Cooperative Intrusion Detection System for Cognitive Radio Networks

Cognitive Radio Networks (CRNs) arise as a promising solution to the scarcity of spectrum. By means of cooperation and smart decisions influenced by previous knowledge, CRNs are able to detect and profit from the best spectrum opportunities without interfering primary licensed users. However, besides the well-known attacks to wireless networks, new attacks threat this type of networks. In this ...

متن کامل

Analysis of Human Immune System Inspired Intrusion Detection System

Artificial Immune Systems (AIS) are algorithms inspired by the human immune system. The human immune system is a robust, decentralized, error tolerant and adaptive system. Such properties are highly desirable for the development of novel computer systems. Unlike some other bio-inspired techniques, such as genetic algorithms and neural networks, the field of AIS encompasses a spectrum of algorit...

متن کامل

Intrusion Detection System Siemens

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Žurnal Sibirskogo federal?nogo universiteta

سال: 2022

ISSN: ['2313-6014', '1997-1370']

DOI: https://doi.org/10.17516/1999-494x-0377