نتایج جستجو برای: intrusion detection systems

تعداد نتایج: 1697719  

1998
Marcelo Medina

Network based distributed intrusion detection is a common trend in several commercial intrusion detection systems. However, network based intrusion detection requires that a security officer comprehends the dynamic and non-deterministic nature of data traffic across the network. This paper provides security officers with a brief introduction to intrusion detection techniques and classifications...

2015

In network security Intrusion detection systems (IDS) are an important element in a network's Typically, Intrusion detection systems are two types.

2005
Giovanni Di Crescenzo Abhrajit Ghosh Rajesh Talpade

We embark into theoretical approaches for the investigation of intrusion detection schemes. Our main motivation is to provide rigorous security requirements for intrusion detection systems that can be used by designers of such systems. Our model captures and generalizes well-known methodologies in the intrusion detection area, such as anomaly-based and signature-based intrusion detection, and f...

Journal: :J. Network and Computer Applications 2007
Tao Peng Christopher Leckie Kotagiri Ramamohanarao

In this paper, we present an information sharing model for distributed intrusion detection systems. The typical challenges faced by distributed intrusion detection systems is what information to share and how to share information. We address these problems by using the Cumulative Sum algorithm to collect statistics at each local system, and use a machine learning approach to coordinate the info...

2005
Hansung Lee Jiyoung Song Daihee Park

intrusion detection system (IDS) is a device or software application that Li et al (2) proposed a fuzzy multi-class support vector machine algorithm, denoted. Detection System. Multiclass SVM, Neural Network, Support Vector Machine. network and (2) network based intrusion detection system which analyzes. of network intrusion detection systems for struggling progressively leading state-of-the ar...

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

2003
Darren Mutz Giovanni Vigna Richard A. Kemmerer

Signature-based intrusion detection systems use a set of attack descriptions to analyze event streams, looking for evidence of malicious behavior. If the signatures are expressed in a well-defined language, it is possible to analyze the attack signatures and automatically generate events or series of events that conform to the attack descriptions. This approach has been used in tools whose goal...

2010
Liberios VOKOROKOS Anton BALÁŽ Branislav MADOŠ

In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...

2007
Ibraheem Alhashim

The problem of intrusion has been a long standing computer security challenge. With governments and institutes relying more on computer networks it is becoming essential to arm networks with defenses against intrusion and misuse. Such intrusions include installing harmful viruses, spreading worms, initiating distributed attacks, and misuse by authorized users. To defend against these attacks, s...

2009
BO SUN

Mobile ad hoc networks and wireless sensor networks have promised a wide variety of applications. However, they are often deployed in potentially adverse or even hostile environments. Therefore, they cannot be readily deployed without first addressing security challenges. Intrusion detection systems provide a necessary layer of in-depth protection for wired networks. However, relatively little ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید