نتایج جستجو برای: intrusion detection systems

تعداد نتایج: 1697719  

2015
Muhammet Baykara

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

Journal: :Inf. Sec. Techn. Report 2005
Andreas Fuchsberger

2014
M. S. Chaudhari

With the rapid growth of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. This can be achieved with an Intrusion Detection System, which identifies attacks and reacts by generating alerts or by blocking the unwanted data/traffic. These systems are mainl...

Journal: :J. Inf. Sci. Eng. 2001
Yao-Tsung Lin Shian-Shyong Tseng Shun-Chieh Lin

Due to the rapid growth of networked computer resources and the increasing importance of related applications, intrusions which threaten the infrastructure of these applications have are critical problems. In recent years, several intrusion detection systems designed to identify and detect possible intrusion behaviors. In this work, an intrusion detection model is proposed to for building an in...

2006
Richard Wasniowski

As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. In this paper we discuss our experience in analyzing potential benefits of distributed multi sensor systems for intrusion detection. Our purpose for this work is ...

2017
Rashmi Chaudhari Sonal Patil

An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...

ژورنال: محاسبات نرم 2017

In this paper, a novel hybrid method is proposed for intrusion detection in computer networks using combination of misuse-based and anomaly-based detection models with the aim of performance improvement. In the proposed hybrid approach, a set of algorithms and models is employed. The selection of input features is performed using shuffled frog-leaping (SFL) algorithm. The misuse detection modul...

2003
Jianhua Sun Hai Jin Hao Chen Qian Zhang Zongfen Han

Intrusion detection systems (IDSs) have become a critical part of security systems. The goal of an intrusion detection system is to identify intrusion effectively and accurately. However, the performance of misuse intrusion detection system (MIDS) or anomaly intrusion detection system (AIDS) is not satisfying. In this paper, we study the issue of building a compound intrusion detection model, w...

2015

Intrusion behavior has the characteristics of fast upgrade, strong concealment In this paper, an integrated network intrusion detection algorithm by combining. judge the safety of a system or network. (6). Intrusion Detection Systems (IDS) are primarily centered on characteristic probable incidents, observation data. ABSTRACT: Intrusion Detection Systems are designed to detect system attacks Re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید