نتایج جستجو برای: intrusion detection

تعداد نتایج: 573174  

2012
K. Vidya

–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...

2016
Anshul Atre Rajesh Singh

Intrusion Detection System (IDS) which is increasing the key element of system security is used to identify the malicious activities in a computer system there are different approaches being employed in intrusion detection systems. The prediction process may produce false alarms in many anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate in establish...

2008
James P. Anderson Dorothy Denning

In this paper, a new learning approach for network intrusion detection using naïve Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset, calculates the conditional probabilities for the best attribute values, and then correctly classifies all the examples of training and testing dataset. Most of the current intrusion detection datas...

2012
M. Moorthy S. Sathiyabama Neveen I. Ghali Lakhwinder Kaur Savita Gupta Shu Yun Lim Qinglei Zhang Wenying Feng Manas Ranjan Patra

The exponential growth in wireless network faults, vulnerabilities, and attacks make the WLAN security management a challenging research area [29]. Data mining applied to intrusion detection is an active area of research. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require proces...

2014
Hussain Ahmad Madni Uppal Memoona Javed M. J. Arshad

The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which is basically an attack to these resources. Then it alerts and informs a...

2009
IFTIKHAR AHMAD AZWEEN B ABDULLAH ABDULLAH S. ALGHAMDI

Intrusion detection systems are the foremost tools for providing safety in computer and network system. There are many limitations in traditional IDSs like time consuming statistical analysis, regular updating, non adaptive, accuracy and flexibility. It is an Artificial Neural Network that supports an ideal specification of an Intrusion Detection System and is a solution to the problems of trad...

2003
Tao Song Jim Alves-Foss Calvin Ko Cui Zhang Karl Levitt

Intrusion detection is considered to be an effective technique to detect attacks that violate the security policy of systems. There are basically three different kinds of intrusion detection: Anomaly detection, misuse detection and specification-based intrusion detection [MB02]. Specification-based intrusion detection differs from the others by describing the desired functionalities of security...

2013
Jun LUO Yijun LI

Intrusion detection system is the indispensable part of every computer. With the increasing attack means, all kinds of intrusion detection methods have appeared. Compared with other intrusion detection methods, the intrusion detection methods based on Conditional Random Fields (CRFs) has better detection effect, but the problems that the accuracy is low when the training data is small and the t...

2016
Deepak Singh Rajput Nitesh Kumar Singh Gyan Ganga

In recent years, the applications based on the Wireless Sensor Networks are growing very fast. The application areas include agriculture, healthcare, military, hospitality management, mobiles and many others. So these networks are very important for us and the security of the network from the various attacks is also a more important issue in WSN application now days. Stopping these attacks or e...

2007
AIKATERINI MITROKOTSA NIKOS KOMNINOS CHRISTOS DOULIGERIS

Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can act as an effective line of defens...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید