منابع مشابه
Review on Intrusion Detection System Architectures in WSN
IJSER © 2016 http://www.ijser.org Review on Intrusion Detection System Architectures in WSN Ishu Gupta Research Scholar, Department of Computer Applications, National Institute of Technology, Kurukshetra136119, Haryana Email: [email protected] Kishu Gupta Research Scholar, Department of Computer Science & Applications, Kurukshetra University, kurukshetra136119, Haryana Email: kishugupta2@gm...
متن کاملSecure & Energy-Efficient Intrusion Detection in WSN
Abstract: One of the most important goal in wireless sensor networks is to transmit the information to sink as soon as possible in a secure and energy efficient manner .The important factor that would make it possible to reach this goal is the design of efficient set selection algorithm in which only required number of sensors will be working such that the entire detection area is covered. In a...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملNetwork Intrusion Forensic Analysis Using Intrusion Detection System
The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...
متن کاملIntrusion Detection System using Fuzzy Logic
Intrusion detection plays an important role in today’s computer and communication technology. As such it is very important to design time efficient Intrusion Detection System (IDS) low in both, False Positive Rate (FPR) and False Negative Rate (FNR), but high in attack detection precision. To achieve that, this paper proposes IDS model based on Fuzzy Logic. Proposed model consists of three part...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2017
ISSN: 2321-9653
DOI: 10.22214/ijraset.2017.11190