نتایج جستجو برای: host based intrusion detection
تعداد نتایج: 3501797 فیلتر نتایج به سال:
A Survey on Present State of the Art of Intrusion Detection Systems in MANETs: Finding Research Gaps
MANET is network with mobile nodes which has no fixed infrastructure support. As the nodes are energy-constrained and have mobility in the real world, they are vulnerable to various kinds of attacks. Therefore intrusion detection system for protecting communications in such network is indispensable. In this paper we review the present state of the art of the intrusion detection systems (IDS) an...
In this paper we present a new method to process sequences of system calls for anomaly intrusion detection. The key idea is to build a multi-layer model of program behaviours based on both hidden Markov models and enumerating methods for anomaly intrusion detection, which differs from the conventional single layer approach. Our experiments on Unix sendmail program have shown that the model is b...
Due to the advancement in wireless technologies, many of new paradigms have opened for communications. Among these technologies, mobile ad hoc networks play a prominent role for providing communication in many areas because of its independent nature of predefined infrastructure. But in terms of security, these networks are more vulnerable than the conventional networks because firewall and gate...
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
While some accurate, current Intrusion Detection Systems (IDS’s) get rapidly overwhelmed with contemporary information workload [1, 2]. This problem partly dwells in the number of repetitive spurious information that IDS’s unnecessarily analyse. Using this observation, we propose a methodology which can be used to significantly remove such spurious information and thus alleviate intrusion detec...
The Windows Operating System (OS) is the most popular desktop OS in the world, as it has the majority market share of both servers and personal computing necessities. However, as its default signature-based security measures are ineffectual for detecting zero-day and stealth attacks, it needs an intelligent Host-based Intrusion Detection System (HIDS). Unfortunately, a comprehensive data set th...
Ensuring that the appropriate level of security is available in wireless networks is absolutely essential. To aid in the defense and detection of potential threats, WLANs should employ security solutions that include an anomaly-based intrusion detection system (ADS) that identify wireless network intrusions by gathering and analyzing the data that is available on the system. This paper is to pr...
Today's Intrusion Detection (ID) ideas focus on two solutions: detecting intrusions based on known vulnerabilities and detecting anomalies in the normal " behavior " in a particular system, be it the network or the host. Although not immune from false-positives or true-negatives, these systems do a lot for ID, but the damage from unknown attacks is more substantial as people deploy these system...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید