نتایج جستجو برای: intrusion detection system
تعداد نتایج: 2688299 فیلتر نتایج به سال:
1. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detec...
Intrusion detection is a major research problem in network security. Due to the nonlinear nature of the intrusion attempts, unpredictable behavior of the network traffic and the large number of features in the problem space, intrusion detection systems represent a complicated problem area. Choosing effective and key features for intrusion detection is a very important topic in information secur...
As computer networks and distributed applications more complex, diverse and intelligent, network behavior anomaly detection has gradually become the effective monitoring and system controlling technology. The paper established a network intrusion detection system and to investigate the data rules, sensors and abnormal behavior automatic identification in this system, a kind of algorithm based o...
Because all vulnerabilities of a network cannot be predicted beforehand, and penetration of the system cannot always be prevented, intrusion detection systems have become necessary to ensure the security of a network. The intrusion detection systems need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today’s network environments, the design of an intr...
Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...
vi
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii
In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice that can be applied to intrusion detection to ascertain a new ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید