نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2010
Liangliang Xiao Yunqi Ye Raymond Paul I-Ling Yen Farokh Bastani

We are facing increasing threats and vulnerability on the Internet. Conventional intrusion detection techniques are not sufficient, especially for new attacks. Thus, it is necessary to adopt intrusion tolerance techniques. However, sophisticated intrusion tolerance techniques may provide better security, but also incur performance penalties. In this paper, we propose an adaptive intrusion toler...

2007
Xia Wang Johnny S. Wong Tu-liang Lin Johnny Wong

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people�s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitorin...

1999
Anup K. Ghosh Aaron Schwartzbard

Intrusion detection and response has traditionally been performed at the network and host levels That is intrusion monitors will typically analyze network packet logs or host machine audit logs for signs of intrusion activity More often than not commercial o the shelf COTS intrusion detection tools use ngerprints of known intrusions to detect their presence in these audit trails Both these appr...

2004
John Reuning

This paper explores the application of probabilistic information retrieval theories to the field of log analysis and host-based intrusion detection. Strong similarities exist between intrusion detection and information retrieval. Using information retrieval techniques may yield significant improvements to the performance of intrusion detection systems. This paper provides a brief review of curr...

2013
Manjot Singh Himanshu Sharma

In wireless sensor networks (WSNs), the significant deviation of measurements from the normal pattern of sensed data are considered as intrusion. The main sources of intrusion are noise and errors, events, and malicious attacks on the network. In this work, we focused on the problem of detecting the intrusion by proposing a model that is based on distribution of sensor data stream approximately...

2005
Richard A. Wasniowski

In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System. A unique feature of this model is that the agent uses data from multiple sensors and the fuzzy logic to process log files. Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that pro...

Journal: :journal of sciences, islamic republic of iran 2012
h. ahmadipour

the sargaz granitic intrusion has been emplaced in sargaz ophiolitic suite, south-east of sanandaj-sirjan metamorphic zone, south of kerman province. the central part of the intrusive body contains pinkish coarse-grained granite, but the fractured northern part, neighboring chah-mazraeh fault, has been subjected to pervasive na-metasomatism and related subsolidus reactions. in the northern alte...

2015
Lihong Tong Qingtao Wu

High-dimensional intrusion detection data concentration information redundancy results in lower processing velocity of intrusion detection algorithm. Accordingly, the current study proposes an intrusion feature selection algorithm based on particle swarm optimization (PSO). Analyzing the features of the relevance between network intrusion data allows the PSO algorithm to optimally search in a f...

2017
Rashmi Chaudhari Sonal Patil

An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...

2006
Hongmei Deng Roger Xu Frank Zhang Chiman Kwan Leonard Haynes

Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical agent-based distributed intrusion detection methodology for MANETs. A two-step intrusion detection procedure has been developed to effectively detect anomalies and identify attack types using distributed intrusion detect...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید