نتایج جستجو برای: intrusion detection systems

تعداد نتایج: 1697719  

2006
Ajith Abraham Crina Grosan

An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. An IDS does not eliminate the use of preventive mechanism but it works as the last defensive mechanism in securing the system. This Chapter evaluates the performances of two Genetic Programming techniques for IDS namely...

Journal: :JIPS 2005
Byung-Joo Kim Il Kon Kim

Computer security has become a critical issue with the rapid development of business and other ftansaction systems over the Intemet. The application of atlificial intelligence, machine learning and data mining techdques to intrusion detection systems has been increasing recently. But most research is focused on improving the classification performaace of a classifier. Selecting important featur...

2013
M. Penchala Praveen M. Sambath S. Ravi

An intrusion detection system is a mechanism that monitors network or system activities for malicious activities. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them and reporting attempts .In organizations use IDPS for other purposes, such as identifying problems with security policies and deterring individua...

2013
S. N. Pawar

The intrusion detection problem is becoming a challenging task due to the proliferation of heterogeneous computer networks since the increased connectivity of computer systems gives greater access to outsiders and makes it easier for intruders to avoid identification [1]. Intrusion detection systems are used to detect unauthorized access to a computer system. A number of soft computing based ap...

Journal: :CoRR 2017
Liu Hua Yeo Xiangdong Che Shalini Lakkaraju

Intrusion detection systems (IDS) help detect unauthorized activities or intrusions that may compromise the confidentiality, integrity or availability of a resource. This paper presents a general overview of IDSs, the way they are classified and the different algorithms used to detect anomalous activities. It also describes the various approaches and the importance of IDSs in information security.

2007
Bharanidharan Shanmugam Norbik Bashah Idris

Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques tha...

Journal: :JCP 2010
Dewan Md. Farid Mohammad Zahidur Rahman

Recently, research on intrusion detection in computer systems has received much attention to the computational intelligence society. Many intelligence learning algorithms applied to the huge volume of complex and dynamic dataset for the construction of efficient intrusion detection systems (IDSs). Despite of many advances that have been achieved in existing IDSs, there are still some difficulti...

2014
Manoj Sharma Keshav Jindal

The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...

Journal: :Computer Standards & Interfaces 2005
Jimmy McGibney Nikita Schmidt Ahmed Patel

In this paper we argue for a new service-centric model for developing and implementing intrusion detection systems. This new approach is influenced by the convergence of computer networking and telecommunications systems, and ways that the telecoms industry manages issues of fraud. Interoperability of intrusion detection components with the rest of the system, in particular logging and billing ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید