نتایج جستجو برای: مدل ids

تعداد نتایج: 125300  

2001
Peter Mell Donald Marks Mark McLarnon

As the capabilities of intrusion detection systems (IDSs) advance, attackers may disable organizations’ IDSs before attempting to penetrate more valuable targets. To counter this threat, we present an IDS architecture that is resistant to denial-of-service attacks. The architecture frustrates attackers by making IDS components invisible to attackers’ normal means of “seeing” in a network. Upon ...

2004
Ajith Abraham Ravi Jain Sugata Sanyal Sang-Yong Han

An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. This paper evaluates three fuzzy rule based classifiers for IDS and the performance is compared with decision trees, support vector machines and linear genetic programming. Further, Soft Computing (SC) based IDS (SCIDS)...

2009
Michael Collins

IDS are regularly evaluated by comparing their false positive and false negative rates on ROC curves. However, this mechanism generally ignores both the context within which the IDS operates and the attacker’s own ability to adapt to IDS behavior. In this paper, we propose an alternative strategy for evaluating IDS based around multiple strategies. Each strategy defines how an attacker profits ...

2003
Masayuki Murakami Nakaji Honda Junji Nishino

The active learning method (ALM), proposed as a methodology of soft computing, simulates human learning and inferencing processes on the basis of fuzzy concepts. This paper presents a hardware implementation of ALM. ALM has processing engines called IDS, which are tasked with extracting useful information from a system subject to modeling. In realizing ALM in hardware, it will be desirable in t...

2006
Jinqiao Yu Y. V. Ramana Reddy Sumitra Reddy

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

Journal: :International Journal of Applied Research in Mechanical Engineering 2011

2016
Wathiq Laftah Al-Yaseen Zulaiha Ali Othman Mohd Zakree Ahmad Nazri

The growth of network attacks has lengthened the intrusion detection system’s (IDS) processing time to detect these attacks. The demand for reducing the processing time has increased when dealing with real time IDS. Several methods were proposed, such as improving the algorithm, or improving the IDS’s architectural design; which includes distributed and parallel. However, this paper sought to p...

Journal: :Journal of cardiovascular electrophysiology 2009
David Lawrence Nicholas Von Bergen Ian H Law David J Bradley Macdonald Dick Patricio A Frias Margaret J Streiper Peter S Fischbach

BACKGROUND Implantable cardioverter defibrillator (ICD) use is increasing in young patients and is frequently complicated by inappropriate device discharges (IDs), leading to discomfort, anxiety and, potentially, proarrhythmia. Dual-chamber (DC) ICDs may decrease IDs by improving rhythm discrimination, but are associated with increased size, expense, and implant complications. We examined wheth...

2018
Huandong Wang Yong Li Gang Wang Depeng Jin

Understanding the linkability of online user identifiers (IDs) is critical to both service providers (for business intelligence) and individual users (for assessing privacy risks). Existing methods are designed to match IDs across two services, but face key challenges of matching multiple services in practice, particularly when users have multiple IDs per service. In this paper, we propose a no...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2002
Solveig Klaebo Reitan Kristian Hannestad

Particular syngeneic adjuvant-free monoclonal antibodies are immunogenic and elicit antibody responses against the variable region idiotypes (Ids). We here study how heavy-chain constant regions (C(H)) regulate immune responses to Ids of free, uncomplexed monoclonal antibodies. To this end, we selected two hybridomas, called Id(3) and Id(A.01), that produce immunogenic IgM(lambda)2 directed tow...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید