نتایج جستجو برای: پایگاه داده nsl kdd

تعداد نتایج: 219169  

Journal: :Computers, materials & continua 2022

With the rapid growth of internet based services and data generated on these are attracted by attackers to intrude networking information. Based characteristics intruders, many researchers attempted aim detect intrusion with help automating process. Since, large volume is transferred through network, security performance remained an issue. IDS (Intrusion Detection System) was developed prevent ...

Journal: :Applied sciences 2023

Vehicular ad hoc networks (VANETs) are used for vehicle to (V2V) and infrastructure (V2I) communications. They a special type of mobile (MANETs) that can share useful information improve road traffic safety. In VANETs, vehicles interconnected through wireless medium, making the network susceptible various attacks, such as Denial Service (DoS), Distributed (DDoS), or even black hole attacks expl...

Journal: :European journal of biochemistry 1994
T W Gadella K W Wirtz

The nonspecific lipid-transfer protein (nsL-TP) from bovine liver was studied by measuring the binding and transfer of the fluorescent phospholipid 1-palmitoyl-2-[6-(1-pyrenyl)-hexanoyl]-sn-glycero-3-phosphocholine (PamPryGroPCho). A kinetic model is presented involving three steps: (a) interaction of nsL-TP with a membrane surface; (b) equilibration of PamPyrGroPCho monomers between the membra...

Journal: :Complexity 2022

Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use convenient for developing, deploying, accessing mobile applications. Currently, security a requisite concern owning open distributed nature of cloud. Copious amounts data are responsible alluring hackers. Thus, developing efficacious IDS an imperative task. This article analyzed four...

Journal: :IEEE Access 2023

As the complexity of network structure increases, so do requirements for architecture are also increasing, and Software Defined Network (SDN) technology has emerged. SDN successfully simplified management, but its open programming nature poses a risk attacks. In complex environments, recognition accuracy traditional models cannot meet speed. view this, this study proposes an attack model based ...

Journal: :Comput. J. 2008
Luk Van Ertvelde Filip Hellebaut Lieven Eeckhout

Architectural simulation is extremely time-consuming given the huge number of instructions that need to be simulated for contemporary benchmarks. Sampled simulation that selects a number of samples from the complete benchmark execution yields substantial speedups. However, there is one major issue that needs to be dealt with in order to minimize non-sampling bias, namely the hardware state at t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده مهندسی برق و کامپیوتر 1393

اکثر کار های انجام شده در این حوزه دارای پیچیدگی محاسباتی بالایی می باشند. در پژوهش انجام شده، با توجه با ماهیت داده های موجود و حملات در سیستم های تشخیص نفوذ یک مدل با سرپرست دو لایه جهت شناخت بی نظمی در سیستم های تشخیص نفوذ مبتنی بر شبکه ارائه شده است. مدل ارائه شده در دوگام اقدام به شناسایی و طبقه بندی تمامی نمونه های مخرب بوسیله ی الگوریتم بیز ساده و جدا سازی نمونه های مخرب از نمونه های طبی...

Journal: :International Journal of Advanced Computer Science and Applications 2022

The internet of things (IoT) is a collection common physical which can communicate and synthesize data utilizing network infrastructure by connecting to the internet. IoT networks are increasingly vulnerable security breaches as their popularity grows. Cyber attacks among most popular severe dangers security. Many academics interested in enhancing systems. Machine learning (ML) approaches were ...

Journal: :Bulletin of Electrical Engineering and Informatics 2022

Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). In IDS, the main problem nuisance network administrators in detecting attacks false alerts. Regardless methods implemented by this system, eliminating alerts still a huge problem. To describe traffic passing through network, database security layer (NSL) knowled...

Journal: :Indian journal of science and technology 2021

Objectives: A highly accurate Intrusion detection model is developed that classifies both the network-based and host-based intrusions without any complexity issues. Method: An optimized Deep Learning (DL) algorithm of IDS presented in form a Hyper-Heuristic Firefly Algorithm based Convolutional Neural Networks (HHFA-CNN). This proposed HHFACNN reduces false values improves accuracy increasing c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید