نتایج جستجو برای: پایگاه داده nsl kdd
تعداد نتایج: 219169 فیلتر نتایج به سال:
With the rapid growth of internet based services and data generated on these are attracted by attackers to intrude networking information. Based characteristics intruders, many researchers attempted aim detect intrusion with help automating process. Since, large volume is transferred through network, security performance remained an issue. IDS (Intrusion Detection System) was developed prevent ...
Vehicular ad hoc networks (VANETs) are used for vehicle to (V2V) and infrastructure (V2I) communications. They a special type of mobile (MANETs) that can share useful information improve road traffic safety. In VANETs, vehicles interconnected through wireless medium, making the network susceptible various attacks, such as Denial Service (DoS), Distributed (DDoS), or even black hole attacks expl...
The nonspecific lipid-transfer protein (nsL-TP) from bovine liver was studied by measuring the binding and transfer of the fluorescent phospholipid 1-palmitoyl-2-[6-(1-pyrenyl)-hexanoyl]-sn-glycero-3-phosphocholine (PamPryGroPCho). A kinetic model is presented involving three steps: (a) interaction of nsL-TP with a membrane surface; (b) equilibration of PamPyrGroPCho monomers between the membra...
Cloud computing paradigm is growing rapidly, and it allows users to get services via the Internet as pay-per-use convenient for developing, deploying, accessing mobile applications. Currently, security a requisite concern owning open distributed nature of cloud. Copious amounts data are responsible alluring hackers. Thus, developing efficacious IDS an imperative task. This article analyzed four...
As the complexity of network structure increases, so do requirements for architecture are also increasing, and Software Defined Network (SDN) technology has emerged. SDN successfully simplified management, but its open programming nature poses a risk attacks. In complex environments, recognition accuracy traditional models cannot meet speed. view this, this study proposes an attack model based ...
Architectural simulation is extremely time-consuming given the huge number of instructions that need to be simulated for contemporary benchmarks. Sampled simulation that selects a number of samples from the complete benchmark execution yields substantial speedups. However, there is one major issue that needs to be dealt with in order to minimize non-sampling bias, namely the hardware state at t...
اکثر کار های انجام شده در این حوزه دارای پیچیدگی محاسباتی بالایی می باشند. در پژوهش انجام شده، با توجه با ماهیت داده های موجود و حملات در سیستم های تشخیص نفوذ یک مدل با سرپرست دو لایه جهت شناخت بی نظمی در سیستم های تشخیص نفوذ مبتنی بر شبکه ارائه شده است. مدل ارائه شده در دوگام اقدام به شناسایی و طبقه بندی تمامی نمونه های مخرب بوسیله ی الگوریتم بیز ساده و جدا سازی نمونه های مخرب از نمونه های طبی...
The internet of things (IoT) is a collection common physical which can communicate and synthesize data utilizing network infrastructure by connecting to the internet. IoT networks are increasingly vulnerable security breaches as their popularity grows. Cyber attacks among most popular severe dangers security. Many academics interested in enhancing systems. Machine learning (ML) approaches were ...
Currently, many companies use data mining for various implementations. One form of implementation is intrusion detection system (IDS). In IDS, the main problem nuisance network administrators in detecting attacks false alerts. Regardless methods implemented by this system, eliminating alerts still a huge problem. To describe traffic passing through network, database security layer (NSL) knowled...
Objectives: A highly accurate Intrusion detection model is developed that classifies both the network-based and host-based intrusions without any complexity issues. Method: An optimized Deep Learning (DL) algorithm of IDS presented in form a Hyper-Heuristic Firefly Algorithm based Convolutional Neural Networks (HHFA-CNN). This proposed HHFACNN reduces false values improves accuracy increasing c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید