نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

2007
L. Todd Heberlein

In 1987 Dorothy Denning wrote in her seminal paper “An Intrusion-Detection Model” the following words: “exploitation of a system’s vulnerabilities involves abnormal use of the system; therefore, security violations could be detected from abnormal patterns of usage.” With these words, Denning kicked off 20 years of research, development, and publications in anomaly-based intrusion detection, whe...

2014
Tejaswini Badgujar

Intrusion detection system has become a core component in computer network era. It is expanding day by day. That is why, there is a need for security from attackers, spammers and criminal enterprises as they are growing up with the expansion of Internet. An Intrusion Detection System is integrated with neural network using layered framework to build an effective computer network. This existing ...

Journal: :CoRR 2013
Hakob Aslanyan José D. P. Rolim

Quantitative characterization of randomly roving agents in Agent Based Intrusion Detection Environment (ABIDE) is studied. Formula simplifications regarding known results and publications are given. Extended Agent Based Intrusion Detection Environment (EABIDE) is introduced and quantitative characterization of roving agents in EABIDE is studies.

2015
Amit Patel Vineet Richariya

To ride the tide of change which is inevitable, innovations are necessary. By using the concept of virtualization most of enterprises are trying to reduce their computing cost. This demand of reducing the computing cost has led to the innovation of Cloud Computing. Nowadays organizations recognized cloud for it different attractive property such as economically attractive and use it to host the...

Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...

2007
Pedro García-Teodoro Jesús E. Díaz-Verdejo Gabriel Maciá-Fernández

This paper presents some proposals and contributions in network-based intrusion-related technologies. Two key points are discussed in this line: anomaly-based intrusion detection, and active response mechanisms. The first issue is mainly focused on the consideration of a stochastic approach to model the normal behavior of the network system to be monitored and protected. This anomaly-based dete...

2002
Thomas Holz

Intrusion detection systems have proved to be an effective instrument for protecting computer and network resources. In addition to preventive security mechanisms (e.g. authentication, encryption, or access control) they provide an automatic detection of security violations. Some systems are able to reduce arising damage by the automatic execution of intrusion response actions. For host-based s...

Journal: :Journal of King Saud University - Computer and Information Sciences 2012

2011
Munish Sharma

In a wireless network system the security is a main concern for a user. It is basically suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also includes using a node bandwidth and increasing the Delay of Service for other host over the network. This paper is basically based on such ty...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید