نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

2016
Mona Lange Felix Kuhr Ralf Möller

With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected throughout a monitored network such that...

Journal: :IJCIP 2012
Jason Reeves Ashwin Ramaswamy Michael E. Locasto Sergey Bratus Sean W. Smith

The power grid depends on embedded control systems or SCADA systems to function properly. Securing these systems presents unique challenges—in addition to the resource restrictions inherent to embedded devices, SCADA systems must accommodate strict timing requirements that are non-negotiable, and their massive scale greatly amplifies costs such as power consumption. Together, these constraints ...

2001
John C. Munson Scott Wimer

Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural based detection. The first two have been extremely popular in the commercial market for a number of years now because they are relatively simple to use, understand and maintain. However, they fall prey to a number of shortc...

1998
Steven A. Hofmeyr Stephanie Forrest

This paper introduces a method of distributed network intrusion detection which scales with the number of computers on a network and is tunable (the probability of detection can be traded off against overhead). Experiments with real network traffic show that the system has high detection rates for several common routes of intrusion, and low false-positive rates under normal behavior. The method...

2000
Eugene Spafford Diego Zamboni

Drawing from the experience obtained during the development and testing of a distributed intrusion detection system, we reflect on the data collection needs of intrusion detection systems, and on the limitations that are faced when using the data collection mechanisms built into most operating systems. We claim that it is best for an intrusion detection system to be able to collect its data by ...

Journal: :the modares journal of electrical engineering 2008
ahmad reza sharafat mahdi rasti

high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...

2002
Gordon Thomas Rohrmair Gavin Lowe

In this paper we will demonstrate how one can model and analyse Intrusion Detection Systems (IDSs) and their environment using the process algebra Communicating Sequential Processes (CSP) [11, 21] and its model checker FDR [9]. An Intrusion Detection System (IDS) is a system that detects abuses, misuses and unauthorised uses in a network. We show that this analysis can be used to discover two a...

2013
Hitesh Gupta

Wireless Sensor Networks (WSNs) are employed in variety of platforms that have prospective to be used in different area such as civil area, military & many more. Wireless Sensor Network is commonly set up in absent & unfriendly environments. The WSN security is affected by various threats & physically & logically may damage itself. So it is necessary to protect entire network with the help of m...

Journal: :J. Information Security 2011
Alok Sharma Sunil Pranit Lal

In this paper we introduced Tanimoto based similarity measure for host-based intrusions using binary feature set for training and classification. The k-nearest neighbor (kNN) classifier has been utilized to classify a given process as either normal or attack. The experimentation is conducted on DARPA-1998 database for intrusion detection and compared with other existing techniques. The introduc...

2000
Diego Zamboni

Intrusion detection systems have usually been developed using large host-based components. These components impose an extra load on the system where they run (sometimes even requiring a dedicated system) and are subject to tampering or disabling by an intruder. Additionally, intrusion detection systems have usually obtained information about host behavior through indirect means, such as audit t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید