نتایج جستجو برای: intrusion detection system
تعداد نتایج: 2688299 فیلتر نتایج به سال:
In this paper a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked. The proposed methodology uses sampled data from KddCup99 data set, an intrusion detection attacks database that is a standard for the evaluation of intrusion detection systems. The performance of backpropagation algorithms implemented in batch mode, is...
Intrusion Detection System plays a reasonable supplementary role for the firewall in the network security. It can help protect computers from network attacks and improve the security and reliability of the computer. At present intrusion detection system analysis module uses the pattern matching technology. In this article an optimized algorithm was proposed through analyzing the advantages and ...
Timing attacks are a challenge for current intrusion detection solutions. Timing attacks are dangerous for web applications because they may leak information about side channel vulnerabilities. This paper presents a massive-multi-sensor zeroconfiguration Intrusion Detection System that is especially good at detecting timing attacks. Unlike current solutions, the proposed Intrusion Detection Sys...
Computer networks are more vulnerable to insider and outsider attacks in recent days due to its widespread use in each field. For that aspect, numbers of security mechanism have been applied to minimize the effect of possible attacks in the network. One of very appealing concept towards network security is intrusion detection system that can able to identify the difference between normal and ab...
intrusion detection system (IDS) is a device or software application that Li et al (2) proposed a fuzzy multi-class support vector machine algorithm, denoted. Detection System. Multiclass SVM, Neural Network, Support Vector Machine. network and (2) network based intrusion detection system which analyzes. of network intrusion detection systems for struggling progressively leading state-of-the ar...
An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks ar e self-propagating, as in the case o f worms, Trojan Horses and denial-of service attacks, they are almost always initiated by an individual whose purpose is to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید