Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Ids Using Layered Crfs with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour

With the ever increasing numberand diverse type of attacks, including new and previouslyunseen attacks, the effectiveness of an Intrusion DetectionSystem is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accurac...

متن کامل

A Survey on IDS Alerts Processing Techniques

When an attacker tries to penetrate the network, there are many defensive systems, including intrusion detection systems (IDSs). Most IDSs are capable of detecting many attacks, but can not provide a clear idea to the analyst because of the huge number of false alerts generated by these systems. This weakness in the IDS has led to the emergence of many methods in which to deal with these alerts...

متن کامل

Data Mining Based Technique for IDS Alerts Classification

Intrusion detection systems (IDSs) have become a widely used measure for security systems. The main problem for those systems results is the irrelevant alerts on those results. We will propose a data mining based method for classification to distinguish serious alerts and irrelevant one with a performance of 99.9 % which is better in comparison with the other recent data mining methods that hav...

متن کامل

A New Model to Manage IDS Alerts

The goal of this paper is to present a new model to reduce the alerts generated by an IDS (Bace, 2000) analyzer. This model allows the administrator to analyze only the messages that really generate risks for an environment or machine. This is very important when you have a complex environment with a lot of machines with many services in them.

متن کامل

Layered Restrictions And

Abstract. A permutation is called layered if it consists of the disjoint union of substrings (layers) so that the entries decrease within each layer, and increase between the layers. We find the generating function for the number of permutations on n letters avoiding (1, 2, 3) and a layered permutation on k letters. In the most interesting case of two layers, the generating function depends onl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Network Security & Its Applications

سال: 2013

ISSN: 0975-2307,0974-9330

DOI: 10.5121/ijnsa.2013.5214