نتایج جستجو برای: intrusion detection systems ids

تعداد نتایج: 1700198  

2014
Anurag Jain Bhupendra Verma J. L. Rana

In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that cl...

2003
Zhang Jian Ding Yong Gong Jian

Current IDSs usually have several shortcomings. First, the speed and sensitivity of detection are not so ideal. Secondly, the response system lacks the ability to correct errors. Thirdly, the cost of intrusion detection is not considered, that is, the response policy is static. This paper applies fuzzy default theory to transform reasoning and response engine of IDS, based on the proving of IDS...

1996
Mansour Esmaili Reihaneh Safavi-Naini Josef Pieprzyk

Abst rac t . Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance....

2012
Ravi Kishore Sharma Gajendra Singh Chandel

This Paper titled “Novel Approach for Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion dete...

2000
Peter Stephenson

Over the past three or four years there has been some controversy regarding the applicability of intrusion detection systems (IDS) to the forensic evidence collection process. Two points of view, essentially, have emerged. One perspective views forensic evidence collection and preservation in the case of a computer or network security incident to be inappropriate for an intrusion detection syst...

2011
Muamer N. Mohammad Norrozila Sulaiman Emad T. Khalaf

Problem statement: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable Intrusion Detection Systems (IDS). Many methods and techniques were used for modeling the IDS, but some of them contribute little or not to resolve it. Approach: Intrusion detection system for local area network by using Support Vector Machines (SVM) wa...

2014
A. Chaudhary V. N. Tiwari A. Kumar

Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gate...

2004
Yi Li

Applications of Mobile Ad Hoc Networks (MANET) are increasing in practice; however, MANET is venerable to attacks due to its mobile and ad hoc natures. The security issue is becoming a major concern and bottle neck in the applications of MANET; therefore, selections of intrusion detection methods are especially important for MANET applications. In the current paper, an overview of existing IDS ...

2005
Jianping Zeng Donghui Guo

More and more application services are provided and distributed over the Internet for public access. However, the security of distributed application severs is becoming a serious problem due to many possible attacks, such as deny of service, illegal intrusion, etc. Because of weakness of the firewall systems in ensuring security, intrusion detection system (IDS) becomes popular. Now, many kinds...

2015
R. Amutha M. Savithri

Intrusion detection for mobile ad hoc network (MANET) is a complex and difficult task due to the nature of the network. The mobile ad hoc network is vulnerable due to its features of open medium, cooperative algorithms, dynamic changing topology, lack of centralized monitoring and management point. The mobile ad hoc networks (MANETs) combine wireless communication with high degree of node mobil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید