نتایج جستجو برای: dynamic anomaly detection

تعداد نتایج: 978818  

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

Journal: :Journal of global tourism research 2021

Journal: :IEEE Transactions on Geoscience and Remote Sensing 2022

A known target detection assumes that the to be detected is provided a priori , while an anomaly unknown without any prior knowledge. As a result, generally performs search-before-detect in active mode, referred as opposed which throw-before-detect passive detection. Accordingly, techniques des...

2002
Ed P. Andert

The state-of-the-practice in Knowledge-Based System (XBS) verification and validation (V&V) three major problems: developers are unaware of the need for and basic issues of V&V, tools are generally unavailable to aid developers, and research has concentrated primarily on static anomaly detection which alone is inadequate for validation of real-world KBSs. This abstract proposes an approach to i...

2003
Kai Hwang Pinalkumar Dave Sapon Tanachaiwiwat

This article presents a new defense system to protect network servers, network routers, and client hosts from becoming the handlers, Zombies, and victims of distributed denial-of-service (DDoS) flood attacks. The NetShield system was developed at USC to protect any IP-based public network over the Internet. We explore preventive and deterrent controls to remove system vulnerabilities on target ...

Journal: :Computers & Security 2016
Fabio Pierazzi Sara Casolari Michele Colajanni Mirco Marchetti

The huge number of alerts generated by network-based defense systems prevents detailed manual inspections of security events. Existing proposals for automatic alerts analysis work well in relatively stable and homogeneous environments, but in modern networks, that are characterized by extremely complex and dynamic behaviors, understanding which approaches can be effective requires exploratory d...

Journal: :I. J. Network Security 2007
Satoshi Kurosawa Hidehisa Nakayama Nei Kato Abbas Jamalipour Yoshiaki Nemoto

This paper analyzes the blackhole attack which is one of the possible attacks in ad hoc networks. In a blackhole attack, a malicious node impersonates a destination node by sending a spoofed route reply packet to a source node that initiates a route discovery. By doing this, the malicious node can deprive the traffic from the source node. In order to prevent this kind of attack, it is crucial t...

2010
Nasser S. Abouzakhar

The rapid growth of Internet malicious activities has become a major concern to network forensics and security community. With the increasing use of IT technologies for managing information there is a need for stronger intrusion detection mechanisms. Critical mission systems and applications require mechanisms able to detect any unauthorised activities. An Intrusion Detection System (IDS) acts ...

2015

Anomaly Detection of Web-based Attacks. Christopher Kruegel chriscs.ucsb.edu. Giovanni Vigna vignacs.ucsb.edu. University of.Using Generalization and Characterization Techniques in the. Anomaly-based Detection of Web Attacks. William Robertson, Giovanni Vigna, Christopher.tem that detects web-based attacks using a number of different techniques. The anomaly detection system takes as input web s...

2010
Mário João Gonçalves Antunes Manuel Eduardo Correia

The Artificial Immune Systems (AIS) constitute an emerging and very promising area of research that historically have been falling within two main theoretical immunological schools of thought: those based on Negative selection (NS) or those inspired on Danger theory (DT). Despite their inherent strengths and well known promising results, both deployed AIS have documented difficulties on dealing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید