نتایج جستجو برای: intrusion detection
تعداد نتایج: 573174 فیلتر نتایج به سال:
Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or attack. When an application runs, there might ...
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are a...
With the ever increased use of computers for critical systems, computer security— the protection of data and computer systems from intentional, malicious intervention—is attracting increasing attention. Many methods of defence already exist, of which one is the strong perimeter defence. This thesis is concerned with one such method of defence, the automated computer security intrusion detection...
With the rapid growth of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. This can be achieved with an Intrusion Detection System, which identifies attacks and reacts by generating alerts or by blocking the unwanted data/traffic. These systems are mainl...
Intrusion Detection Systems (IDSs) detects the network factor for traditional SNORT (Network Based Intrusion. Detection Using Genetic Algorithms for intrusion detection has proven to be an implementation method. Section IV. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Traffic Data Classifi...
The study examined the detection of attacks against computer networks, which is becoming a harder problem to solve in the field of Network security. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented depend on rule-based expert systems where new attacks are not detectabl...
As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people�s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitorin...
This paper explores the application of probabilistic information retrieval theories to the field of log analysis and host-based intrusion detection. Strong similarities exist between intrusion detection and information retrieval. Using information retrieval techniques may yield significant improvements to the performance of intrusion detection systems. This paper provides a brief review of curr...
In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System. A unique feature of this model is that the agent uses data from multiple sensors and the fuzzy logic to process log files. Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that pro...
An Intrusion detection system (IDS) is a device or a software application that monitors a network or systems for malicious activity or policy violations. Intrusion Detection Systems supports to discover, determine, and identify unauthorized use, duplication, alteration, and destruction of information systems. So, to make intrusion detection system more efficient, the techniques that are more ad...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید