نتایج جستجو برای: intrusion detection

تعداد نتایج: 573174  

2005
RICHARD A. WASNIOWSKI

In this paper we propose a framework for intrusion detection called Fuzzy Agent-Based Intrusion Detection System . A unique feature of this model is that the agent uses the fuzzy logic to process log files. This reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation. This paper discusses th...

2011
Muamer N. Mohammad Norrozila Sulaiman Emad T. Khalaf

Problem statement: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable Intrusion Detection Systems (IDS). Many methods and techniques were used for modeling the IDS, but some of them contribute little or not to resolve it. Approach: Intrusion detection system for local area network by using Support Vector Machines (SVM) wa...

2006
You Chen Yang Li Xueqi Cheng Li Guo

The Intrusion detection system deals with huge amount of data which contains irrelevant and redundant features causing slow training and testing process, higher resource consumption as well as poor detection rate. Feature selection, therefore, is an important issue in intrusion detection. In this paper we introduce concepts and algorithms of feature selection, survey existing feature selection ...

2015
M. Tubaishat

Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...

2000
Joseph P. Loyall Partha P. Pal Richard E. Schantz Franklin Webber

Traditional Intrusion Detection Systems (IDSs) mostly work off-line, without any direct runtime interaction or coordination with the applications (and with other IDSs) that they aim to protect. Including intrusion detection and response in the repertoire of an adaptive application extends its range of adaptivity and increases its chances for survival. In this paper we show how intrusion detecti...

2013
Li Liu Pengyuan Wan Yingmei Wang Songtao Liu

Ad hoc networks face serious security threat due to its inherent weaknesses. Intrusion detection is crucial technology in protecting the security of Ad hoc networks. Recently, Intrusion Detection Systems (IDS) face open issues, such as how to make use of intrusion detection technologies to excavate normal/abnormal behaviors from a lot of initialized data and dig out invasion models later for in...

2018
Yuancheng Li Rixuan Qiu Sitong Jing

Advanced Metering Infrastructure (AMI) realizes a two-way communication of electricity data through by interconnecting with a computer network as the core component of the smart grid. Meanwhile, it brings many new security threats and the traditional intrusion detection method can't satisfy the security requirements of AMI. In this paper, an intrusion detection system based on Online Sequence E...

1999
Christopher Wee

Bio: Christopher Wee is a Researcher in the Computer Security Group at the University of California, Davis, Computer Science Department. His current research interests are intrusion detection, security auditing and Formal policy specifications. Chris has participated in three intrusion detection systems projects: DIDS, a LAN intrusion detection system, GrIDS: a wide-area IDS, and LAFS: a file-s...

2016
Muhammad Fahad Umer Muhammad Sher Imran Khan

Traditional network-based intrusion detection systems using deep packet inspection are not feasible for modern high-speed networks due to slow processing and inability to read encrypted packet content. As an alternative to packetbased intrusion detection, researchers have focused on flow-based intrusion detection techniques. Flow-based intrusion detection systems analyze IP flow records for att...

2003
Darren Mutz Giovanni Vigna Richard A. Kemmerer

Signature-based intrusion detection systems use a set of attack descriptions to analyze event streams, looking for evidence of malicious behavior. If the signatures are expressed in a well-defined language, it is possible to analyze the attack signatures and automatically generate events or series of events that conform to the attack descriptions. This approach has been used in tools whose goal...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید