نتایج جستجو برای: intrusion detection systems ids
تعداد نتایج: 1700198 فیلتر نتایج به سال:
In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that cl...
Current IDSs usually have several shortcomings. First, the speed and sensitivity of detection are not so ideal. Secondly, the response system lacks the ability to correct errors. Thirdly, the cost of intrusion detection is not considered, that is, the response policy is static. This paper applies fuzzy default theory to transform reasoning and response engine of IDS, based on the proving of IDS...
Abst rac t . Intrusion Detection Systems (IDS) have previously been built by hand. These systems have difficulty successfully classifying intruders, and require a significant amount of computational overhead making it difficult to create robust real-time IDS systems. Artificial Intelligence techniques can reduce the human effort required to build these systems and can improve their performance....
This Paper titled “Novel Approach for Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion dete...
Over the past three or four years there has been some controversy regarding the applicability of intrusion detection systems (IDS) to the forensic evidence collection process. Two points of view, essentially, have emerged. One perspective views forensic evidence collection and preservation in the case of a computer or network security incident to be inappropriate for an intrusion detection syst...
Problem statement: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable Intrusion Detection Systems (IDS). Many methods and techniques were used for modeling the IDS, but some of them contribute little or not to resolve it. Approach: Intrusion detection system for local area network by using Support Vector Machines (SVM) wa...
Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gate...
Applications of Mobile Ad Hoc Networks (MANET) are increasing in practice; however, MANET is venerable to attacks due to its mobile and ad hoc natures. The security issue is becoming a major concern and bottle neck in the applications of MANET; therefore, selections of intrusion detection methods are especially important for MANET applications. In the current paper, an overview of existing IDS ...
More and more application services are provided and distributed over the Internet for public access. However, the security of distributed application severs is becoming a serious problem due to many possible attacks, such as deny of service, illegal intrusion, etc. Because of weakness of the firewall systems in ensuring security, intrusion detection system (IDS) becomes popular. Now, many kinds...
Intrusion detection for mobile ad hoc network (MANET) is a complex and difficult task due to the nature of the network. The mobile ad hoc network is vulnerable due to its features of open medium, cooperative algorithms, dynamic changing topology, lack of centralized monitoring and management point. The mobile ad hoc networks (MANETs) combine wireless communication with high degree of node mobil...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید