نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

2014
V. L. Pavani Prof. B. Sathyanarayana

MANET is network with mobile nodes which has no fixed infrastructure support. As the nodes are energy-constrained and have mobility in the real world, they are vulnerable to various kinds of attacks. Therefore intrusion detection system for protecting communications in such network is indispensable. In this paper we review the present state of the art of the intrusion detection systems (IDS) an...

2003
Xuan Dau Hoang Jiankun Hu Peter Bertók

In this paper we present a new method to process sequences of system calls for anomaly intrusion detection. The key idea is to build a multi-layer model of program behaviours based on both hidden Markov models and enumerating methods for anomaly intrusion detection, which differs from the conventional single layer approach. Our experiments on Unix sendmail program have shown that the model is b...

2014
A. Chaudhary V. N. Tiwari A. Kumar

Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gate...

By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

2005
Fernando Godínez Dieter Hutter Raúl Monroy

While some accurate, current Intrusion Detection Systems (IDS’s) get rapidly overwhelmed with contemporary information workload [1, 2]. This problem partly dwells in the number of repetitive spurious information that IDS’s unnecessarily analyse. Using this observation, we propose a methodology which can be used to significantly remove such spurious information and thus alleviate intrusion detec...

Journal: :Future Internet 2016
Waqas Haider Gideon Creech Yi Xie Jiankun Hu

The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS). Unfortunately, a comprehensive data set th...

2009
Shu Yun Lim Andy Jones

Ensuring that the appropriate level of security is available in wireless networks is absolutely essential. To aid in the defense and detection of potential threats, WLANs should employ security solutions that include an anomaly-based intrusion detection system (ADS) that identify wireless network intrusions by gathering and analyzing the data that is available on the system. This paper is to pr...

Journal: :International Journal of Computer Applications 2013

2003
Michael R. Hines

Today's Intrusion Detection (ID) ideas focus on two solutions: detecting intrusions based on known vulnerabilities and detecting anomalies in the normal " behavior " in a particular system, be it the network or the host. Although not immune from false-positives or true-negatives, these systems do a lot for ID, but the damage from unknown attacks is more substantial as people deploy these system...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید