نتایج جستجو برای: intrusion detection

تعداد نتایج: 573174  

2002
R. Guha

In this paper we propose a distributed agent framework for an intrusion detection system aimed at ad hoc wireless networks. Wireless networks are particularly vulnerable to intrusion, as they operate in an open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple security agents, we analyze the entire ad hoc wireless network for intr...

2014
Shahul Kshirsagar S. R. Yadav

To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data packets and each packet has to scan for its detection. This paper works to develo...

2014
Elnaz B. Noeparast Reza Ravanmehr Ramin Nasiri

Most of the intrusion detection systems are unable to detect behavior-based intrusions such as Stuxnet, because of their absolute view of the intrusion. There are some legitimate behaviors which their subsequences cause intrusions. In this paper, a multi-agent model inspired by the human immune system has been proposed whose autonomous agents have a conditional view towards intrusion concept. T...

2004
Craig Valli

The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...

Journal: :IJIIT 2015
Anand Kannan Karthik Gururajan Venkatesan Alexandra Stagkopoulou Sheng Li Sathyavakeeswaran Krishnan Arifur Rahman

This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extend...

Journal: :journal of computer and robotics 0
soheila mirzagholi faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran karim faez electrical engineering department, amirkabir university of technology, tehran, iran

mobile ad-hoc networks have attracted a great deal of attentions over the past few years. considering their applications, the security issue has a great significance in them. security scheme utilization that includes prevention and detection has the worth of consideration. in this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

2004
V. Chatzigiannakis G. Androulidakis M. Grammatikou B. Maglaris

Intrusion Detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external intruders. Intrusion Detection Systems provide in depth packet analysis and application awareness and can be deployed for discovering network attacks. In this scenario a system that gives intelligence about the traffic on your network is necessary. This ...

2015
Muhammet Baykara

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...

2012
James P. Anderson

Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining a...

2005
M. F. Tolba M. S. Abdel-Wahab I. A. Taha A. M. Al-Shishtawy

Applying intrusion detection to the fast growing computational Grid environments improves the security which is considered to be the heart of this new field. Flexible cooperative distributed intrusion detection architecture is introduced that suits and benefits from the underlying Grid environment. The proposed architecture was tested using homogeneous distributed intrusion detection servers th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید