نتایج جستجو برای: intrusion detection systems

تعداد نتایج: 1697719  

2015

Genetic Algorithm technique try to improve the rates for better detection. The proposed firewalls, antivirus, and intrusion detection systems. (IDSs), cybercriminal activity automatically use these groups to train a new RBF classifier to detect. Abstract— Intrusion Detection Systems (IDSs) detects the network attacks by For this purpose Genetic Algorithm uses a function called. “Fitness Function”.

2007
Emmanuel Hooper

Complex network and internetwork attacks evade the detection of intrusion detection systems including insertions, evasions and distributed denial of service attacks. The presence of these complex attacks along with false positives in intrusion detection systems has resulted in inefficient detection and response to such packets in current network infrastructure systems. In this paper we analyse ...

2013
Amit Bhardwaj Parneet Kaur

Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defense. Intrusion Detection System identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In t...

2017

The necessity of efficient intrusion detection system increased recent research to be focused on hybrid techniques for better results. In recent research plenty of intrusion detection systems have been proposed with various data mining techniques, machine learning mechanisms and fuzzy logic. Existing intrusion detection systems suffered from higher false positive rate and negative rate. This pa...

2018

The necessity of efficient intrusion detection system increased recent research to be focused on hybrid techniques for better results. In recent research plenty of intrusion detection systems have been proposed with various data mining techniques, machine learning mechanisms and fuzzy logic. Existing intrusion detection systems suffered from higher false positive rate and negative rate. This pa...

2004
Salvador Mandujano Arturo Galván

This paper describes a variation to the traditional intrusion detection approach motivated by longstanding challenges and recent trends in information security. Intrusion detection systems have historically focused on the protection of local resources by identifying signs of malicious activity that may help administrators prevent a break-in and limit its effects. Outbound intrusion detection fo...

The proposed framework applies two game theoretic models for economic deployment of intrusion detection system (IDS). The first scheme models and analyzes the interaction behaviors of between an attacker and intrusion detection agent within a non-cooperative game, and then the security risk value is derived from the mixed strategy Nash equilibrium. The second scheme uses the security risk value...

2008
James P. Anderson Dorothy Denning

In this paper, a new learning approach for network intrusion detection using naïve Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset, calculates the conditional probabilities for the best attribute values, and then correctly classifies all the examples of training and testing dataset. Most of the current intrusion detection datas...

Journal: :CoRR 2012
N. Ugtakhbayar D. Battulga Shirmen Sodbileg

Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is a relatively new addition to such techniques. Intrusion detection systems (IDS) are used to find out if someone has intrusion into or is trying to get it the network. One big problem is amount of Intrusion which is increasing day by day. We need to know about network...

2014
Hussain Ahmad Madni Uppal Memoona Javed M. J. Arshad

The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which is basically an attack to these resources. Then it alerts and informs a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید