نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

Journal: :JCP 2017
Ivan Homoliak Dominik Breitenbacher Petr Hanácek

There are distinguished two categories of intrusion detection approaches utilizing machine learning according to type of input data. The first one represents network intrusion detection techniques which consider only data captured in network traffic. The second one represents general intrusion detection techniques which intake all possible data sources including host-based features as well as n...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم پایه 1391

a simple, rapid and low-cost scanner spectroscopy method for the glucose determination by utilizing glucose oxidase and cdte/tga quantum dots as chromoionophore has been described. the detection was based on the combination of the glucose enzymatic reaction and the quenching effect of h2o2 on the cdte quantum dots (qds) photoluminescence.in this study glucose was determined by utilizing glucose...

Journal: :IEEE Network 2009
Thomas Chen Zhi Fu Liwen He W. Timothy Strayer

GUEST EDITORIAL bout 20 years ago in November 1988, the Morris worm spread through the Internet, taking down thousands of computers. The incident prompted the U.S. Defense Advanced Research Programs Agency to establish the CERT/CC to coordinate activities to defend against future Internet security problems, and was one of the first media stories to raise public awareness about network security....

2009
Seyed A. Shahrestani

With the massive connectivity provided by modern computer networks, more and more systems are subject to attack by intruders. The creativity of attackers, the complexities of host computers, along with the increasing prevalence of distributed systems and insecure networks such as the Internet have contributed to the difficulty in effectively identifying and counteracting security breaches. As s...

2015
Abhishek Sawant Jyoti Yadav Avneet Kaur Arora Janhavi Deo

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

Journal: :Computers & Security 2010
Natalia Stakhanova Samik Basu Johnny S. Wong

As the number of attacks on computer systems increases and become more sophisticated, there is an obvious need for intrusion detection systems to be able to effectively recognize the known attacks and adapt to novel threats. The specification-based intrusion detection has been long considered as a promising solution that integrates the characteristics of ideal intrusion detection system: the ac...

2015
Charissa Ann Ronao Sung-Bae Cho

Data have become a very important asset to many organizations, companies, and individuals, and thus, the security of relational databases that encapsulate these data has become a major concern. Standard database security mechanisms, as well as network-based and host-based intrusion detection systems, have been rendered inept in detecting malicious attacks directed specifically to databases. The...

2009
Ruth Rendell

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

2012
V. Sivakumar T. Yoganandh R. Mohan Das

With the growth of computer networking, electronic commerce, and web services, security of networking systems has become very important. Many companies now rely on web services as a major source of revenue. Computer hacking poses significant problems to these companies, as distributed attacks can render their cyberstorefront inoperable for long periods of time. This happens so often, that an en...

2010
Liberios VOKOROKOS Anton BALÁŽ Branislav MADOŠ

In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید