نتایج جستجو برای: intrusion detection systems ids

تعداد نتایج: 1700198  

1999
Roland Büschkes

This paper discusses solutions to protect the privacy of users during the application of intrusion detection systems (IDS) and introduces the notion of multilateral secure IDS. The surveillance of users by an IDS threatens their privacy. However, an IDS depends on data gathered by monitoring and must be able to unambiguously identify an intruder in case of an emergency. To mediate between the c...

2014
Niva Das Tanmoy Sarkar

-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system ...

2012
K. Vidya

–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...

Journal: :CoRR 2010
Mueen Uddin Azizah Abdul Rahman

Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial that efficient scalable techniques should be developed for IDS systems. Signature based detection is the most extensively used threat detection technique for Intrusion Detection Systems (IDS). One of the foremost challeng...

2008
Christoph Ehret Ulrich Ultes-Nitsche

The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still need to be designed for IT systems. The human immune system (HIS) can detect and defend against yet unseen intruders, is distributed, adaptive and multilayered to name only a few of its features. Our immune system incorpo...

2001
Mahmood Hossain

The goal of a network-based intrusion detection system (IDS) is to identify patterns of known intrusions (misuse detection) or to differentiate anomalous network activity from normal network traffic (anomaly detection). Data mining methods have been used to build automatic intrusion detection systems based on anomaly detection. The goal is to characterize the normal system activities with a pro...

2015

mod_security (an open source intrusion detection and prevention engine for to the Internet, securing your systems against attackers must be a high priority. An Intrusion Detection System against DDOS for MANETs attacks MANET also contains wireless sensor nodes, these highly secure IDS to detect attacks. 2. knowledge from the packet flow and packet details to detect DDOS attacks.

2012
Kanubhai K. Patel Bharat V. Buddhadev

Received Nov 4 th , 2012 Revised Dec 19 th , 2012 Accepted Dec 22 th , 2012 Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is an essential element of any contemporary information system. There are mainly two techniques for intrusion detection: i) misuse (signature-based) detection and ii) anomal...

2013
Sharmila Kishor Wagh Vinod K. Pachghare Satish R. Kolhe

In today’s world, almost everybody is affluent with computers and network based technology is growing by leaps and bounds. So, network security has become very important, rather an inevitable part of computer system. An Intrusion Detection System (IDS) is designed to detect system attacks and classify system activities into normal and abnormal form. Machine learning techniques have been applied...

1999
Håkan Kvarnström

This report gives a review of commercial tools available for detecting intrusions in computer systems and networks. Seventeen systems are evaluated and a short introductory overview is provided for each. A classification especially designed for intrusion detection systems (IDS) is utilized to compare and evaluate different features and aspects of the products. This work identifies a number of i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید