نتایج جستجو برای: intrusion detection

تعداد نتایج: 573174  

2011
Purvag Patel Chet Langin Feng Yu Shahram Rahimi

Our research created a network Intrusion Detection Math (ID Math) consisting of two components: (1) a way of specifying intrusion detection types in a manner which is more suitable for an analytical environment; and (2) a computational model which describes methodology for preparing intrusion detection data stepwise from network packets to data structures in a way which is appropriate for sophi...

2015
Megha Gupta K. Q. Yan S. C. Wang S. S. Wang Z. Muda W. Yassin M. N. Suleiman N. I. Udzir Vipul P. Hattiwale

In current scenario most of the intrusion detection systems (IDS) use one of the two detection methods, misused detection or Anomaly detection?both of them have their own limitations. Technology has developed the technique that combines misuse detection system with anomaly detection system (ADS) or network intrusion detection system and host-based intrusion detection system is known as hybrid i...

2007
YU Yan HUANG Hao

There exist some issues in current intrusion detection algorithms such as unbalanced detection performance on different types of attacks, and redundant or useless features that will lead to the complexity of detection model and degradation of detection accuracy. This paper presents an ensemble approach to intrusion detection based on improved multi-objective genetic algorithm. The algorithm gen...

2006
Jinqiao Yu Y. V. Ramana Reddy Sumitra Reddy

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

2016
Tichun Wang Hongyang Zhang Lei Tian Haifeng Hu Weina He

In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks. The intense demand for electronic commerce has intensified the growth of hacking incidents. Network security is a systematic concept, and the effective security policy or scheme is the primary goal of network information security. ...

2012
Xin Xu

In the information era, as computer networks and related applications become more and more popular, security problems are more and more serious in global information infrastructure. It was reported that in the past two years, large amounts of network attacks and computer viruses caused great damages to global economy and the potential threats to the global information infrastructure have increa...

2013
Ajita Mishra Ashish Kumar Srivastava

Security of Wireless network becomes associate in nursing woeful necessary issues with the speedy development of wireless network that is in danger for an honest vary of attacks due to preparation among the hostile atmosphere and having limited resources. Now a day wireless detection network is a unit which is loosely utilized in environmental management, police investigation tasks, monitoring ...

2000
Susan M. Bridges Rayford B. Vaughn

This paper describes a prototype intelligent intrusion detection system (IIDS) that is being developed to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic. This system combines two distinct intrusion detection approaches: 1) anomaly based intrusion detection using fuzzy data mining techniques, and 2) misuse detection using traditional rule-based expert system tec...

2010
Muna Mhammad T. Jawhar Monica Mehrotra

As networks grow both in importance and size, there is an increasing need for effective security monitors such as Network Intrusion Detection System to prevent such illicit accesses. Intrusion Detection Systems technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid fuzzy logic and neural networ...

2012
Vijaya Lakshmi

Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید