نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

Journal: :ACM Transactions on Information and System Security 2010

1999
Jianxiong Luo Susan M. Bridges Julia E. Hodges

This report explores integrating fuzzy logic with two data mining methods (association rules and frequency episodes) for intrusion detection. Data mining methods are capable of extracting patterns automatically from a large amount of data. The integration with fuzzy logic can produce more abstract and flexible patterns for intrusion detection, since many quantitative features are involved in in...

2017
Manuel López Martín Belén Carro Antonio Sánchez-Esguevillas Jaime Lloret Mauri

The purpose of a Network Intrusion Detection System is to detect intrusive, malicious activities or policy violations in a host or host's network. In current networks, such systems are becoming more important as the number and variety of attacks increase along with the volume and sensitiveness of the information exchanged. This is of particular interest to Internet of Things networks, where an ...

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

Journal: :Computer Networks 2007
Animesh Patcha Jung-Min Park

As advances in networking technology help to connect the distant corners of the globe and as the Internet continues to expand its influence as a medium for communications and commerce, the threat from spammers, attackers and criminal enterprises has also grown accordingly. It is the prevalence of such threats that has made intrusion detection systems—the cyberspace’s equivalent to the burglar a...

2004
Ulf T. Mattsson

Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial market for a number of years now because they are relatively simple to use, understand and maintain. However, they fall prey to a number of shortc...

2002
MAHMOOD HOSSAIN

The goal of an intrusion detection system (IDS) is to identify authorized and unauthorized intruders by differentiating anomalous network activity from normal network traffic. Data mining methods have been used to build automatic intrusion detection systems. The central idea is to utilize auditing programs to extract a set of features that describe each network connection or host session, and a...

2000
Urupoj Kanlayasiri Surasak Sanguanpong

Intrusion detection has been performed at network and host level for detecting various attacks. Port scanning could be classified as one of the network intrusions. This paper presents a method for detecting port scanning attacks using rule-based state diagram techniques. A set of rules corresponding with the appropriate thresholds was designed for intrusion decision. Experiment results under re...

The Miocene Qohrud granitoid intrusion consists of granite, granodiorite and tonalite and is located in the Urmia-Dokhtar magmatic belt. Intrusion of magmatic rocks into the various sedimentary rocks including shale, sandstone, limestone and marl, with Jurassic to Eocene age, has caused contact metamorphism of the surrounded rocks. Varity of hornfelses and skarns are formed in this regards. Hyd...

2014
Niva Das Tanmoy Sarkar

-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید