Implementation of Ship Intrusion Detection and Monitoring System by Labview

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation and Performance Evaluation of Intrusion Detection and Response System

Modern intrusion detection systems (IDS) are deployed in high-speed networks. Thus, they must be able to process a large amount of data in real time. This raises the issue of performance and required an evaluation of these IDS. We present in this paper an evaluation approach, based on a series of tests. The aim is to measure the performance of the components of an IDS and their effects on the e...

متن کامل

Design and Implementation of Intrusion Detection System ( Ids ) Sensor Deployment

Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a highperformance network intrusion detection system that com...

متن کامل

Monitoring Instruction-based Intrusion Detection and Self-healing System

Anomaly-based Intrusion Prevention Systems (IPSs) currently protect systems from zero-day attacks. However, since they either only inform administrators about the intrusions and/or just stop services or systems, they cannot stably continue services until the vulnerabilities are fixed by security patches. So self-healing systems (SHSs) are needed because they continue to safely execute services ...

متن کامل

Hardware Implementation of Intrusion detection system for Ad-Hoc Network

Received Apr 24, 2016 Revised Aug 3, 2016 Accepted Aug 18, 2016 New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so sec...

متن کامل

Implementation of a Hybrid Intrusion Detection System Using Fuzzyjess

This paper describes an implementation of a fuzzy inference engine that is part of a Hybrid Fuzzy Logic Intrusion Detection System. A data-mining algorithm is used offline to capture features of interest in network traffic and produce fuzzy-logic rules. Using an inference engine, the intrusion detection system evaluates these rules and gives network administrators indications of the firing stre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJIREEICE

سال: 2014

ISSN: 2321-2004

DOI: 10.17148/ijireeice.2014.0210011