نتایج جستجو برای: web intrusion detection system

تعداد نتایج: 2839330  

Journal: :نشریه دانشکده فنی 0
مهدی آبادی سعید جلیلی

in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Journal: :J. Inf. Sci. Eng. 2006
Ill-Young Weon Doo Heon Song Chang-Hoon Lee

In the field of network intrusion detection, both the signature-based intrusion detection system and the machine learning-based intrusion detection system possess advantages and disadvantages. When the two discrepant systems are combined in a way that the former is used as the main system and the latter as a supporting system, the machine learning-based intrusion detection system measures the v...

2014
Yi-fei Zhang

The paper analyzes the characteristics of various types of Web application system security vulnerabilities. Based on the deformation of Web attack , according to the principle of Web application vulnerabilities occur, attack methods and targets, the attack characteristics is extended, Proposed a structural model of IPS intrusion prevention based on the feature recognition. The experiments showe...

2015
J. K. Kalita

Consequently, Intrusion Detection Systems (IDS) are quickly becoming a Intrusion Detection System Using Ontology and Clustering Techniques, Book Title. NIDS solutions offer sophisticated, real-time intrusion detection capabilities often Though this method takes time to set up, as baselining requires the NIDS. State-of-the-art intrusion detection, prevention and reaction simulation systems analy...

2003
Vlasti Broucek Paul Turner Urs E. Gattiker

As the dangers of hacking and cyber-warfare for network security become a reality, the need to be able to generate legally admissible evidence of criminal or other illegal on-line behaviours has become increasingly important. While technical systems providing intrusion detection and network monitoring are constantly being improved, the security they provide is never absolute. As a result, when ...

Journal: :Computer Networks 2005
Christopher Krügel Giovanni Vigna William K. Robertson

Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are equipped with a large number of signatures. Unfortunately, it is difficult to keep up with the daily disclosure of web-related vulnerabilities, and, in addition, vulnerabilities may be introduced by installation-specif...

Journal: :J. Information Security 2012
Shahriar Mohammadi Vahid Allahvakil Mojtaba Khaghani

The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network intrusion detection and prevention system consist of collecting traffic data, analyzing them based on detection rules and generate alerts or dropping them if necessary. However IPS ...

2008
Liberios VOKOROKOS Anton BALÁŽ Norbert ÁDÁM

The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...

2016
Harshal A. Karande Pooja A. Kulkarni Shyam S. Gupta Deepak Gupta

1 Research Scholar, Department of Computer Engineering, Siddhant College of Engineering, Sadumbare, Pune, Maharashtra, India. 2 Research Scholar, Department of Computer Engineering, Siddhant College of Engineering, Sadumbare, Pune, Maharashtra, India. 3 PG Co-ordinator and Assistant Professor, Department of Computer Engineering, Siddhant College of Engineering, Sadumbare, Pune, Maharashtra, Ind...

2005
Salvador Mandujano

Outbound intrusion detection is a systems vigilance approach that aims at limiting the effects of a security threat by collectively scrutinizing outgoing traffic and local system activity. This paper summarizes the design and implementation of FROID, an outbound intrusion detection prototype built with agent technology that exploits the semantic power of ontologies in order to enable collaborat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید