نتایج جستجو برای: intrusion detection systems
تعداد نتایج: 1697719 فیلتر نتایج به سال:
Computer systems of today are subject to many attacks and it can be anticipated that these problems will increase in the future era. One way of protecting the systems is to use better authentication and other categories of preventive security mechanisms. These mechanisms do not offer good enough protection in most cases and they should therefore be complemented with monitoring and detection mec...
In The extensive growth of computing networks and tools and tricks for intruding into and attacking networks has underscored the importance of intrusion detection in network security. Yet, contemporary intrusion detection systems (IDS) are limiting in that they typically employ a misuse detection strategy, with searches for patterns of program or user behavior that match known intrusion scenari...
This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...
Designers of intrusion detection systems are often faced with the problem that their design fails to meet the specification because the actual implementation is not able to detect attacks as required. This work aims at addressing such shortcomings at an early stage of the design process. The proposed method provides guidance to intrusion detection systems designers by predicting whether or not ...
Signature based intrusion detection systems cannot detect new attacks. These systems are the most used and developed ones. Current anomaly based intrusion detection systems are also unable to detect all kinds of new attacks because they are designed to restricted applications on limited environment. Current hackers are using new attacks where neither preventive techniques mainly based on access...
Intrusion detection systems are most popular de-fence mechanisms used to provide security to IT infrastructures. Organisation need best performance, so it uses multiple IDSs from different vendors. Different vendors are using different formats and protocols. Difficulty imposed by this is the generation of several false alarms. Major part of this work concentrates on the collection of alerts fro...
One of the most important responsibilities of every company is to preserve the integrity, confidentiality, and availability of its data. Many efforts have been made to accomplish this goal: security policies, firewalls, intrusion detection systems, anti-virus software, and standards to configure services in operating systems and networks. This paper focuses on one of those topics: intrusion det...
Intrusion detection systems are the foremost tools for providing safety in computer and network system. There are many limitations in traditional IDSs like time consuming statistical analysis, regular updating, non adaptive, accuracy and flexibility. It is an Artificial Neural Network that supports an ideal specification of an Intrusion Detection System and is a solution to the problems of trad...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید